Mock Test Papers: Paper 7 - EIS-SM

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Mock

Test Papers Paper 7 – EIS-SM


MTP - 1
30 Marks
1 What are the means by which long term objectives will 1
be achieved?
(a) Strategies
(b) Policies
(c) Strength
(d) Opportunities
2 A possible and desirable future state of an 1
organization is called:
(a) Mission
(b) Vision
(c) Strategy implementation
(d) Strategy formulation
3 What are the guides to decision making? 1
(a) Rules
(b) Procedures
(c) Goals
(d) Policies
4 Strategic Management handles: 1
(a) external issues
(b) management issues
(c) internal issues
(d) administration issues
5 Which one of the following is of concern for not-for- 1
profit organizations?
(a) The markets to service
(b) Identifying suppliers to deal with
(c) Developing capabilities
(d) Building monopolies

7.1
6 Protecting integrity of data primarily focuses on: 1
(a) Intentional Leakage of data
(b) Accidental loss of Data
(c) Accuracy and Completeness
(d) Data backup Procedures
7 Which of the following is primary requirement of 1
granting user access to information asset?
(a) Identification
(b) Authorisation
(c) Authentication
(d) Need to know
8 One Time password is considered strong because they 1
are:
(a) Active for short period
(b) Communicated on your mobile phone
(c) Is unique for each user
(d) Unique for session
9 A critical function of a firewall is to act as a: 1
(a) special router that connects the Internet to a LAN.
(b) device for preventing authorized users from accessing
the LAN.
(c) server used to connect authorized users to private
trusted network resources.
(d) proxy server to increase the speed of access to
authorized users.
10 Which of the following is the PRIMARY safeguard for 1
securing software and data within an information
processing facility?
(a) Security awareness
(b) Reading the security policy
(c) Security committee
(d) Logical access controls
11 Which of the following can be identified as a best 2
statement that represents a firms big picture
statements, describing a desired end state, general in
scope and not restrictive?
(a) Corporate philosophy statement
(b) Company creed
(c) Vision statement

7.2
(d) Mission statement
12 Which of the following statements best describes 2
strategic management?
(a) A process consisting of determining objectives and
strategic actions to achieve those objectives
(b) A process consisting of determining objectives,
strategic actions to achieve those objectives, the
implementation of desired strategy, and the
monitoring of that strategy
(c) A process consisting of the determination of direction,
strategic actions to achieve objectives, the
implementation of desired strategy, and monitoring of
that strategy
(d) A process for determining direction, strategic actions
to achieve objectives, and the implementation of
desired strategy
13 Which of the following would you not expect to see in a 2
vision statement?
(a) Descriptions of desirable future situations
(b) Motivational terminology
(c) Focus on the values to which the organization is
committed
(d) What the organization seeks to do to reach desirable
future states
14 Which of the following is a consideration when 2
assessing the appropriateness of a strategy?
(a) Synergy
(b) Stakeholders
(c) Competitive advantage
(d) Resources
15 Which of the following is NOT a characteristic of 2
strategic management that makes it different from
other types of management?
(a) It is interdisciplinary
(b) It has an external focus
(c) It has an internal focus
(d) It concerns the present direction of the organization
16 Which of the following shall BEST help in deciding 2
upon the protection level for information asset?

7.3
(a) Location of asset
(b) Impact of Risk
(c) Vulnerabilities in asset
(d) Inventory of threats
17 Which of the following is a risk response option? 2
(a) Determining likelihood of threat
(b) Determine probability of risk
(c) Deciding the amount of insurance cover to be taken
(d) Prepare risk profile report
18 Organisations capacity to sustain loss due to 2
uncertainty and expressed in monetary terms is best
known as:
(a) Risk Appetite
(b) Risk Tolerance
(c) Risk Acceptance
(d) Risk Mitigation
19 After classification of data, which of the following 2
controls can be implemented effectively as due to the
classification help availed?
(a) Input Validation Controls
(b) Access Controls
(c) Scanning for viruses
(d) Internal Audit
20 As an IS Auditor while reviewing the risks of the 2
enterprise under audit, which of the following is a risk
factor that may have impact on organisation and needs
immediate attention?
(a) Management decides to acquire new application
software.
(b) A new application required by organisation is
released.
(c) Vendor decides to stop supporting existing
application.
(d) Organisation retires old application that is not in use.

Answers – MTP 11 (Information Systems Control Audit)


1 A 7 A 13 D 19 B
2 B 8 A 14 D 20 C

7.4
3 D 9 C 15 D
4 A 10 D 16 B
5 A 11 C 17 C
6 C 12 C 18 A

7.5
7.6

You might also like