1. How threats are identified? (2 Marks)
2. Differentiate encryption form decryption
3. Define firewall?
4. Differentiae data form information in your own words
5. What is the responsibilities of the management of the organization to ensure the security of information system
6. what do you mean by keystroke monetary
7. Define Reengineering
8. What do you understand ESS
9. Identify any phase of SLDC
10. How can change management phases
MCQZ Portion
1. Crypto analysis the science and art of transforming messages to make them secure and immune to attacks
True
False
2. if an organization tolerate some downtime cold sites backup might be appropriate.
True
False
3. Board of Directors Are elected from
Option A
Option B
Option C
Option C
3. information that is outdated inaccurate or hard to understand has much less value
True
False
4. which of the following Is true about Entity
Option A
Option B
Option C
5. what of the following is a data model or diagram for high – level description of conceptual data model
Option A
Option B
Option C
Option D
6_______is not one of the components of the supply chain
Option A
Option B
Option C
Option D
6. Which of the following is the primary method for keeping a computer secure form intruders
Option A
Option B
Option C
Option D
7. There are Typically two kind of audit Records
True
False
8. Procedures are organized in a ________ Manner to for system
a . System
b. Logical
c. Hybrid
d Physical