System Analysis and Design Online MCQ Set 21

QN01. auditing with a computer we mean

  1. the inputs and the corresponding outputs are compared and checked for correctness
  2. the programs and procedures are checked for correctness
  3. special synthetic data is input and outputs checked for correctness
  4. programs are written to check the functioning of the computer hardware
Answer

(C)special synthetic data is input and outputs checked for correctness

QN02. The purpose of parallel run is to

  1. to see whether outputs of a newly computerized system matches those of currently running manual or legacy system
  2. have redundancy for reliability
  3. test an operational information system
  4. test a system being newly designed
Answer

(A)to see whether outputs of a newly computerized system matches those of currently running manual or legacy system

QN03. The main objectives of testing are

  1. when correct inputs are fed to the system the outputs are correct
  2. when incorrect inputs are fed to the system they are detected and rejected
  3. the requirement specifications are correct
  4. verify that the controls incorporated in the system function correctly
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. i, ii, iv
Answer

(D)i, ii, iv

QN04. By security of an information system we mean protecting

  1. data from accidental or intentional damage or loss
  2. programs from accidental or intentional corruption or loss
  3. programs and data from unauthorized disclosure or change
  4. individual private data from disclosure
  1. i and ii
  2. i and iii
  3. i, ii, iii
  4. i, ii, iii, iv
Answer

(C)i, ii, iii

QN05. By auditing through the computer we mean

  1. the inputs and the corresponding outputs are compared and checked for correctness
  2. the programs and procedures are checked for correctness
  3. special synthetic data is input and outputs checked for correctness
  4. programs are written to check the functioning of the computer hardware
Answer

(B)the programs and procedures are checked for correctness

QN06. By Electronic Commerce we mean:

  1. Commerce of electronic goods
  2. Commerce which depends on electronics
  3. Commerce which is based on the use of internet
  4. Commerce which is based on transactions using computers connected by telecommunication network
Answer

(B)Commerce which depends on electronics

QN07. For carrying out C2C e-Commerce the following infrastructure is essential:

  1. World Wide Web
  2. Corporate network
  3. Electronic Data Interchange standards
  4. Secure Payment Services
  5. Secure electronic communication link connecting businesses
  1. i and ii
  2. ii and iv
  3. i
  4. i and iv
Answer

(C)i

QN08. Disadvantages of e-Commerce in India are

  1. internet access is not universally available
  2. credit card payment security is not yet guaranteed
  3. transactions are de-personalized and human contact is missing
  4. cyberlaws are not in place
  1. i and ii
  2. ii and iii
  3. i, ii, iii
  4. i, ii, iii, iv
Answer

(C)i, ii, iii

QN09. In B2B e-Commerce

  1. Co-operating Business should give an EDI standard to be used
  2. Programs must be developed to translate EDI forms to a form accepted by application program
  3. Method of transmitting/receiving data should be mutually agreed
  4. It is essential to use internet
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. ii, iii, iv
Answer

(B)i, ii, iii

QN10. By security in e-Commerce we mean

  1. Protecting an organization's data resource from unauthorized access
  2. Preventing disasters from happening
  3. Authenticating messages received by an organization
  4. Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations
  1. i, ii
  2. ii, iii
  3. iii, iv
  4. i, iii, iv
Answer

(D)i, iii, iv

QN11. Filtering of packets by firewall based on a router has facilities to

  1. prevent access to internet to some clients in the intranet
  2. prevent access at certain specified times
  3. filter packets based on source or destination IP address
  4. prevent access by certain users of the internet to other specified users of the internet
  1. i, iii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. ii, iii, iv
Answer

(B)i, ii, iii

QN12. By encryption of a text we mean

  1. compressing it
  2. expanding it
  3. scrambling it to preserve its security
  4. hashing it
Answer

(C)scrambling it to preserve its security

QN13. Encryption can be done

  1. only on textual data
  2. only on ASCII coded data
  3. on any bit string
  4. only on mnemonic data
Answer

(C)on any bit string

QN14. DES works by using

  1. permutation and substitution on 64 bit blocks of plain text
  2. only permutations on blocks of 128 bits
  3. exclusive ORing key bits with 64 bit blocks
  4. 4 rounds of substitution on 64 bit blocks with 56 bit keys
Answer

(A)permutation and substitution on 64 bit blocks of plain text

QN15. Triple DES

  1. is a symmetric key encryption method
  2. guarantees excellent security
  3. is implementable as a hardware VLSI chip
  4. is public key encryption method with three keys.
Answer

(ii)guarantees excellent security

QN16. DES and public key algorithm are combined

  1. to speed up encrypted message transmission
  2. to ensure higher security by using different key for each transmission
  3. as a combination is always better than individual system
  4. as it is required in e-Commerce
  1. i and ii
  2. ii and iii
  3. iii and iv
  4. i and iv
Answer

(A)i and ii

QN17. Hashed message is signed by a sender using

  1. his public key
  2. his private key
  3. receiver's public key
  4. receiver's private key
Answer

(B)his private key

QN18. In SET protocol a customer sends a purchase order

  1. encrypted with his public key
  2. in plain text form
  3. encrypted using Bank's public key
  4. using digital Signature system
Answer

(D)using digital Signature system

QN19. In NetBill's protocol for small payments for internet services

  1. Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account
  2. The vendor supplies the key to NetBill server when he receives payment
  3. Checksum of encrypted information received by customer is attached to his payment order
  4. Vendor does not encrypt information purchased by customer
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. i, ii, iv
Answer

(B)i, ii, iii

QN20. In Electronic cash payment

  1. a customer withdraws “coins” in various denominations signed by the bank
  2. the bank has a database of issued coins
  3. the bank has a database of spent coins
  4. the bank cannot trace a customer
  1. i, ii
  2. i, ii, ii
  3. i, ii, iii, iv
  4. ii, iii, iv
Answer

(B)i, ii, ii

QN21. For carrying out B2B e-Commerce the following infrastructure is essential:

  1. World Wide Web
  2. Corporate network
  3. Electronic Data Interchange standards
  4. Secure Payment Services
  5. Secure electronic communication link connecting businesses
  1. i, ii, iii
  2. ii, iii, iv
  3. ii, iii, iv, v
  4. i, ii, iii, iv, v
Answer

(C)ii, iii, iv, v

QN22. Advantages of B2C commerce to customers are

  1. wide variety of goods can be accessed and comparative prices can be found
  2. shopping can be done at any time
  3. privacy of transactions can be guaranteed
  4. security of transactions can be guaranteed
  1. i and ii
  2. ii and iii
  3. iii and iv
  4. i and iv
Answer

(A)i and ii

QN23. EDI use

  1. requires an extranet
  2. requires value added network
  3. can be done on internet
  4. requires a corporate intranet
Answer

(C)can be done on internet

QN24. A firewall is a

  1. wall built to prevent fires from damaging a corporate intranet
  2. security device deployed at the boundary of a company to prevent unauthorized physical access
  3. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
  4. device to prevent all accesses from the internet to the corporate intranet
Answer

(C)security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

QN25. A hardened firewall host on an intranet

  1. has a proxy application gateway program running on it
  2. allows specified internet users to access specified services in the intranet
  3. initiates all internet activities requested by clients and monitors them
  4. prevents outsiders from accessing IP addresses within the intranet
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. ii, iii, iv
Answer

(C)i, ii, iii, iv

QN26. By applying permutation (31254) and substitution by 5 characters away from current character (A → F, B → G etc..) the following string ABRACADABRA becomes

  1. FGWCAAADRBF
  2. RABCAAADRBF
  3. WFGHFFFIWGF
  4. None of the above
Answer

(C)WFGHFFFIWGF

QN27. Triple DES

  1. Cannot be broken in reasonable time using presently available computers.
  2. Can be broken only if the algorithm is known using even slow computer.
  3. Can be broken with presently available high performance computers.
  4. It is impossible to break ever.
Answer

(A)Cannot be broken in reasonable time using presently available computers.

QN28. Message can be sent more securely using DES by

  1. encrypting plain text by a different randomly selected key for each transmission
  2. encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system
  3. using an algorithm to implement DES instead of using hardware
  4. designing DES with high security and not publicizing algorithm used by it
Answer

(B)encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system

QN29. While sending a signed message, a sender

  1. sends message key using public key encryption using DES and hashed message using public key encryption
  2. sends message using public key encryption and hashed message using DES
  3. sends both message and hashed message using DES
  4. sends both message and hashed message using public key encryption
Answer

(A)sends message key using public key encryption using DES and hashed message using public key encryption

QN30. One of the problems with using SET protocol is

  1. the merchant's risk is high as he accepts encrypted credit card
  2. the credit card company should check digital signature
  3. the bank has to keep a database of the public keys of all customers
  4. the bank has to keep a database of digital signatures of all customers
Answer

(C)the bank has to keep a database of the public keys of all customers

QN31. In Electronic cash payment

  1. a debit card payment system is used
  2. a customer buys several electronic coins which are digitally signed by coinissuing bank
  3. a credit card payment system is used
  4. RSA cryptography is used in the transactions
Answer

(B)a customer buys several electronic coins which are digitally signed by coinissuing bank

QN32. For carrying out B2C e-Commerce the following infrastructure is essential:

  1. World Wide Web
  2. Corporate network
  3. Electronic Data Interchange standards
  4. Secure Payment Services
  5. Secure electronic communication link connecting businesses
  1. i, iv
  2. i, iii, iv
  3. ii, iii
  4. i, ii, iii, iv
Answer

(A)i, iv

QN33. Electronic Data Interchange is necessary in

  1. B2C e-Commerce
  2. C2C e-Commerce
  3. B2B e-Commerce
  4. Commerce using internet
Answer

(C)B2B e-Commerce

QN34. EDIFACT standard was developed by

  1. American National Standard Institute
  2. International Standard Institute
  3. European Common Market
  4. United Nations Economic Commission for Europe
Answer

(D)United Nations Economic Commission for Europe

QN35. A firewall may be implemented in

  1. routers which connect intranet to internet
  2. bridges used in an intranet
  3. expensive modem
  4. user's application programs
Answer

(A)routers which connect intranet to internet

QN36. A hardened firewall host on an Intranet is

  1. a software which runs in any of the computers in the intranet
  2. a software which runs on a special reserved computer on the intranet
  3. a stripped down computer connected to the intranet
  4. a mainframe connected to the intranet to ensure security
Answer

(B)a software which runs on a special reserved computer on the intranet

QN37. DES

  1. is a symmetric key encryption method
  2. guarantees absolute security
  3. is implementable as hardware VLSI chip
  4. is a public key encryption method
  1. i and ii
  2. ii and iii
  3. i and iii
  4. iii and iv
Answer

(C)i and iii

QN38. Public key encryption method is a system

  1. which uses a set of public keys one for each participant in e-Commerce
  2. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him
  3. which uses the RSA coding system
  4. which is a standard for use in e-Commerce
Answer

(B)in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him

QN39. A digital signature is

  1. a bit string giving identity of a correspondent
  2. a unique identification of a sender
  3. an authentication of an electronic record by tying it uniquely to a key only a sender knows
  4. an encrypted signature of a sender
Answer

(C)an authentication of an electronic record by tying it uniquely to a key only a sender knows

QN40. The Secure Electronic Transaction protocol is used for

  1. credit card payment
  2. cheque payment
  3. electronic cash payments
  4. payment of small amounts for internet services
Answer

(A)credit card payment

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.