Cisy 431:Introduction To Information Systems Question Paper
Cisy 431:Introduction To Information Systems
Course:Computer Science
Institution: Kenya Methodist University question papers
Exam Year:2012
KENYA METHODIST UNIVERSITY
END OF 3''RD ''TRIMESTER 2012 (EVENING) EXAMINATIONS
FACULTY : COMPUTING AND INFORMATICS
DEPARTMENT : COMPUTER SCIENCE AND BUSINESS
INFORMATION
UNIT CODE : BBIT 443/CISY 431
UNIT TITLE : INTRODUCTION TO INFORMATION SYSTEMS
SECURITY
TIME : 2 HOURS
Instructions:
Answer all questions
Question One
1. Define the following terms. (6 marks)
Non- Repudiation
Confidentiality
Attack
2. List three types of information system audit. (3 marks)
3. Explain the main reasons why cyber terrorism is currently high in Kenya. (4 marks)
4. Describe the main types of Antiviruses (3 marks)
5. Using a diagram show the four interrelated domains of COBIT. (4 marks)
6. Describe the three classes of intruders. (6 marks)
7. Briefly describe two techniques used to avoid guessable passwords.
(4 marks)
SECTION B
Answer two questions in this section
Question Two
An organization’s information security is only as good as the policies, procedures and practices designed to maintain it. With a diagram show the relationship between the three and list the objectives of each.
(5 marks)
What are the main functions of IDS and IPS.
(5 marks_
Discuss basic COBIT principles and explain the benefits of implementing COBIT as a governance framework.
(10 marks)
Question Three
Critical to Is security is the distinction between policy and mechanism. Distinguish between:
Security policy and
Security mechanism.
(4 marks)
To say that system security risks analysis is an important issue is an understatement. Its difficult to quantify losses suffered each year by business arising from the use, misuse and abuse of information systems.
Identify at least five main risks the computer systems are exposed to and, for each of these risks, suggest some appropriate control.
(10 marks)
Show that the three security services-confidentiality, integrity, and availability – are sufficient to deal with the threats of disclosure, disruption, deception and usurpation.
(6 marks)
Question Four
Describe the various stages of information system auditing and format of writing audit report.
(10 marks)
Managers need to determine the maximum amount of time the business can survive with its systems down and what parts need to be restored first. List and describe the steps in developing system’s disaster recovery strategy and plan (DRSP) that will ensure business continuity (BC) and availability of critical computing services.
(10 marks)
More Question Papers
Exams With Marking Schemes
Popular Exams
Mid Term Exams
End Term 1 Exams
End Term 3 Exams
Opener Exams
Full Set Exams
Return to Question Papers