Professional Documents
Culture Documents
Disa QB For e Assessment
Disa QB For e Assessment
1 Hardware
Q2 Softwares that perform tasks that users are directly interested in:-
A. System Software
B. Application Software
C. Device Drivers
D. Sort Utilities
Q4 Registers:
Q5 Used to Bridge speed differences between registers & RAM & ROM:
A. Virtual Memory
B. Secondary Memory
C. Cache Memory
D. Primary Memory
Q6 Planning and monitoring of the computer resources to ensure that the systems are
running effectively & efficiently:-
A. Capacity Planning
B. Hardware Monitoring
C. Hardware Maintenance
D. Auditing Hardware
Q7 For effective computer capacity planning the most essential activity is:
A. Liaising with the management and hardware suppliers
B. Evaluating for the cheapest Hardware
C. Determining the workload of applications
D. Evaluating a cost effective DBMS
1 A 6 A
2 B 7 C
3 A 8 C
4 C 9 C
5 C 10 D
SAQ 1.2 System Software
A. Multithreading
B. Multitasking
C. Multiprocessing
D. Spooling
A. Operating system (OS) being used is compatible with the existing hardware platform.
B. OS updates have been scheduled to minimize negative impacts on company needs.
C. OS has the latest versions and updates.
D. Applications are compatible with the current or planned OS
A. DBMS
B. Device Drivers
C. System Software
D. General Purpose Softwares
Q6 Technologies and systems that prevent unauthorized users from privileges prescribed by
owner of the contents are:
A. HM (Hardware Management)
B. DRM (Digital Rights Management)
C. SAM (Software Asset Management)
D. DBMS (Database Management Systems)
Q7 To protect its Intellectual property rights (IPR) an Enterprise needs:
Q8 Software License Terms (EULA) & Certificate of Authenticity are required for:
Q9 When choosing off-the-shelf software, which of the following are the two most important
criteria?
Q10 Which of the following are ways of validating purchased software information?
A. Using the software yourself and running it through a series of tests based on the criteria for
selecting software
B. Sending prospective vendors a questionnaire asking specific questions about their
packages
C. Reviewing software documentation and technical marketing literature
D. All of the above
ANSWERS
1 A 6 B
2 B 7 C
3 C 8 D
4 D 9 C
5 C 10 D
SAQ1.3 DBMS
Q1 Which of the following ensures that each row can be uniquely identified by an attribute
called primary key?
A. Domain Integrity
B. Entity Integrity
C. Referential integrity
D. All of the above
Q2 The language used by application programs to request data from the DBMS is referred to
as the:
A. DDL
B. DML
C. DCL
D. None of the above
Q3 The schema that defines the contents of database from users perspective is
A. External Schema
B. Conceptual Schema
C. Internal Schema
D. Logical schema
Q6 Which of the following Integrity Constraints ensures that Data values of primary key are all
valid & not null
A. Entity Integrity
B. Domain Integrity
C. Referential Integrity
D. All of the above
Q7 Which of the following is disadvantage of Normalisation.
A. Reduced Redundancy
B. Data integrity
C. Optimise Storage Space
D. Reduced processing Efficiency
Q8 Applications request information from the DBMS using which of the following Language
A. External Schema
B. Conceptual schema
C. Internal schema
D. Liaising with users
Q10 In a Bank, what type of relationship exists between a Customer table and Account table?
A. One to one
B. One to many
C. Many to many
D. One to many and many to many
ANSWERS
1 B 6 A
2 B 7 D
3 A 8 B
4 D 9 C
5 D 10 B
SAQ 1.4 HARDWARE SOFTWARE DEPLOYMENT STRATEGIES
5. Internet Router & Two factor Authentication, are part of which component of a Data Centre
in a CBS?
A. Hardware.
B. EMS.
C. Application Solutions.
D. Network & Security.
1 B 6 D
2 C 7 B
3 D 8 C
4 A 9 B
5 D 10 D
SAQ 2.1 Networking Basics
Q1 Which of the following devices forwards data packets to all connected ports?
A. Router
B. Switch
C. Bridge
D. Hu
Q2 Your Company in planning to upgrade the networks. Vendor is offering both active and
passive hubs. The passive hubs are cheaper than the active ones. To take a decision what is the
difference between an active and a passive hub?
Q3 Which of the following devices passes data based on the MAC address?
A. Hu
B. Switch
C. MAU
D. Router
A. Tree
B. Star
C. Mesh
D. Bus
Q7 An ISP which wants a highly Fault tolerant Network Topology will select which of the
following?
A. Bus
B. Ring
C. Star
D. Mesh
A. Attenuation
B. Delay Distortion
C. Security
D. Noise
Q9 Which of the following devices would you find only on a Token Ring network?
A. MAU
B. Hu
C. Switch
D. Router
A. Packet Switching
B. Circuit Switching
C. Token Switching
D. Message Switching
ANSWERS
1 D 6 C
2 B 7 D
3 B 8 C
4 C 9 A
5 B 10 C
SAQ 2.2 Networking Standards
A. ICMP
B. TCP
C. SMTP
D. FTP
A. Network
B. Application
C. Physical
D. Data Link
A. Message addressing
B. Path determination
C. Physical addressing
D. Routing
A. Transport Layer
B. Data Link Layer
C. Physical Layer
D. Application Layer
A. Physical addressing
B. Error detection
C. Routing
D. Flow control
Q6 Which protocol working at the Transport layer provides a connectionless service between
hosts?
A. IP
B. ARP
C. TCP
D. UDP
Q7 If a router interface is congested, which protocol in the IP suite is used to tell neighbour
routers?
A. RARP
B. ARP
C. ICMP
D. TCP
A. Electrical
B. Radio
C. Soun
D. Infrared
A. POP3
B. MIME
C. SMTP
D. S-MIME
ANSWERS
1 A 6 D
2 B 7 C
3 C 8 B
4 D 9 B
5 C 10 C
SAQ 2.3 THE IP NETWORKS
2. Which of the of the following Classes of IPV4 addresses has Maximum number of Networks?
A. Class A
B. Class B
C. Class D
D. Class C
4. IPV4 Address is
A. 8 bit
B. 16 bit
C. 32 bit
D. 128 bit
1 B 6 D
2 D 7 A
3 C 8 B
4 C 9 D
5 C 10 D
SAQ 3.1 Firewalls
1. A Firewall is a
A. Hardware device
B. Software
C. Combination of hardware and software
D. None of the above
6. The firewall that allows traffic from outside only if it is in response to traffic from internal hosts,
is
A. Application level gateway firewall
B. Stateful Inspection Firewall
C. Packet filtering Router
D. Circuit level gateway
10. Giving open access to Internet to the employees of an organization through its network for
market research and knowledge enhancement may lead to
A. Increased employee motivation and productivity
B. Better usage of the network resources
C. Malicious attacks on important data
D. Better employee bonding with their customers through social sites and mail services.
ANSWERS
1 C 6 B
2 A 7 D
3 A 8 C
4 B 9 D
5 A 10 C
SAQ 3.2 CONFIGURING PERSONAL FIREWALLS
2. Which of the following Intrusion Detection System (IDS) are placed at a strategic point or
points within the network to monitor traffic to and from all devices on the network?
A. HIDS
B. Anomaly-based IDS
C. Passive IDS
D. NIDS
4. Which of the following would provide the BEST prevention against the intrusion of a computer
connected to the Internet?
A. An Intrusion Detection System
B. A proxy server
C. A DMZ
D. A personal firewall
1 A
2 D
3 C
4 D
5 A
SAQ 3.3 CRYPTOGRAPHY & PKI
1. Which of the following elements proves that it is actually the sender who has sent the
message.
A. Integrity
B. Privacy
C. Non-repudiation
D. Authentication
2. A CA e-mails Audit Reports to clients and wants reasonable assurance that no one has
altered the Report. This objective can be achieved by:
A. Signing the document using the CA's Symmetric Key.
B. Encrypting the hash of the Report using the CA's private key.
C. Encrypting the hash of the Report using the CA's public key.
D. Encrypting the report using the CA's symmetric key
7. Symmetric encryption:
A. Can cause key management to be difficult
B. Provides authentication
C. Is slower than asymmetric encryption
D. Ensures integrity
8. To ensure authentication and integrity of a message, the sender should encrypt the hash of
the message with:
A. Sender’s Public key
B. Sender’s Private Key
C. Receiver’s Public Key
D. Receiver’s Private Key
1 C 6 C
2 B 7 A
3 A 8 B
4 C 9 B
5 D 10 A
SAQ 3.4 APPLICATION OF CYPTOGRAPHIC SYSTEMS
1. The Secure Sockets Layer (SSL) protocol addresses the confidentiality of a message through:
A. Public Key of Server
B. Hash function.
C. Symmetric encryption
D. Digital signature certificates
3. In the following mode end to end (Host to host) security of data is provided.
A. Tunnel
B. Transport
C. Either Tunnel or Transport
D. None of the above
4. When we are browsing on to a secure Income Tax site which protocol are we using?
A. IPsec
B. S-MIME
C. HTTPS
D. SET
1 C
2 D
3 B
4 C
5 B
Module: 1, Primer on Information Technology – Facilitated e-Learning
4 Embracing IT will enable Auditors provide Consulting and Assurance services to an enterprise in the areas of
A. IT Risk Management
B. IT Strategic Planning
C. IT Security Management
D. All of the above.
5 An IS Auditor auditing the on-line transaction processing system of an organization outsourced to a third party
will be most concerned that
A. Transactions are authorized by the outsourced agency.
B. Transaction log is not printed on daily basis.
C. Organization does not have adequate trained IT personnel.
D. The third party is providing outsourced services to other clients also.
ANSWERS
1 C
2 C
3 B
4 D
5 A
Module: 1, Primer on Information Technology – Facilitated e-Learning
3 Which of the following is a tool that helps in predicting future trends & behaviors, allowing business managers
to make proactive, knowledge driven decisions
A. Data warehouse
B. Data mining
C. Data marts
D. Data Dictionary
6 E-commerce is:
A. Any electronic communication between a Company and its shareholders
B. Organization using electronic media to link to its employees
C. Conduct of business activities over computer networks electronically.
D. The use of electronic communications for all business processes.
ANSWERS
1 D
2 C
3 B
4 B
5 D
6 C
Module: 1, Primer on Information Technology – Facilitated e-Learning
4 Embracing IT will enable Auditors provide Consulting and Assurance services to an enterprise in the areas of
A. IT Risk Management
B. IT Strategic Planning
C. IT Security Management
D. All of the above.
5 An IS Auditor auditing the on-line transaction processing system of an organization outsourced to a third party
will be most concerned that
A. Transactions are authorized by the outsourced agency.
B. Transaction log is not printed on daily basis.
C. Organization does not have adequate trained IT personnel.
D. The third party is providing outsourced services to other clients also.
ANSWERS
1 C
2 C
3 B
4 D
5 A
Module: 1, Primer on Information Technology – Facilitated e-Learning
3 Which of the following is a tool that helps in predicting future trends & behaviors, allowing business managers
to make proactive, knowledge driven decisions
A. Data warehouse
B. Data mining
C. Data marts
D. Data Dictionary
6 E-commerce is:
A. Any electronic communication between a Company and its shareholders
B. Organization using electronic media to link to its employees
C. Conduct of business activities over computer networks electronically.
D. The use of electronic communications for all business processes.
ANSWERS
1 D
2 C
3 B
4 B
5 D
6 C
Module: 1, Primer on Information Technology – Facilitated e-Learning
1 C
2 D
3 D
4 B
5 D
Module: 1, Primer on Information Technology – Facilitated e-Learning
2 Which of the following refers to a normal operational activity for conduct of business?
A. DSS
B. Expert Systems
C. Artificial Intelligence
D. Transaction Processing Systems
5 Which of the following systems is used to present high-level overview of information as well as the ability to
drill down to details for senior managers?
A. Decision support system
B. Executive support system
C. Expert support system
D. Transaction-processing system
ANSWERS
1 B
2 D
3 A
4 C
5 B
Module: 1, Primer on Information Technology – Facilitated e-Learning