Professional Documents
Culture Documents
MC - Data Security Integrity
MC - Data Security Integrity
MC - Data Security Integrity
Multiple Choice
Identify the choice that best completes the statement or answers the question.
1. Which of the following actions is NOT considered b. Is an error-checking system
to be a computer crime? c. Represents data in digitized electronic pulses
d. Is an example of continuous data
a. Encryption
b. Piracy 7. Which of the following is an example of a data type
c. Industrial Espionage check?
d. Hacking
a. Ensuring that numbers are positive in a quantity
2. Which of the following precautions is NOT a ordered field
physical restriction with respect to data security? b. Examining whether or not a field is the required
type in a date field
a. Firewall c. Requiring a user to enter his or her e-mail
b. Locking up the hardware address twice
c. Fireproof cabinets d. Testing that only letters are entered in a name
d. Biometric systems field
3. A new employee at a financial company has been
asked to set a password on her computer. She has
tried setting the password on several occasions but
gets an error message which says “password not
effective”. The problem can be corrected by
entering a password that is
a. espionage
b. encryption
c. coding
d. eavesdropping
5. Disguising data and programs is also called
a. translation
b. encryption
c. conversion
d. compilation
6. Which of the following is TRUE for parity?
MULTIPLE CHOICE
1. ANS: A PTS: 1 NOT: CSEC Specimen 2008
2. ANS: A PTS: 1 NOT: CSEC Specimen 2008
3. ANS: D PTS: 1 NOT: CSEC June 2010
4. ANS: B PTS: 1 NOT: CSEC June 2010
5. ANS: B PTS: 1 NOT: CSEC June 2011
6. ANS: B PTS: 1 NOT: CSEC June 2011
7. ANS: B PTS: 1 NOT: CSEC June 2011