Archive for February 28, 2007

Question 80

Which of the following statements correctly defines UCS-2 (Unicode)?

a) It is a code system mainly used under UNIX. It uses a single byte to represent an alphanumeric character and two bytes to represent a Chinese character.
b) It is a code system currently used in many personal computers. It uses a single byte to represent an alphanumeric character and two bytes to represent a Chinese character.
c) It is a code system that uses a single byte to represent all characters
d) It is a code system adaptable to coded character sets in many countries. It uses two bytes to represent all characters.

answer

Advertisements

Leave a Comment

Question 79

The framework for building a security management system specified in BS 7799-2 consists of steps through below. What is the correct order of these steps?

maru1.png Select and/or add management objectives and management measures to be implemented.
maru2.png Determine the scope of the information security management system.
maru3.png Create an implementation declaration.
maru4.png Define security policies.
maru5.png Conduct a risk assessment.
maru6.pngManage risks

a) maru3.pngmaru4.pngmaru2.pngmaru6.pngmaru5.pngmaru1.png
b) maru3.pngmaru4.pngmaru5.pngmaru6.pngmaru1.pngmaru2.png
c) maru4.pngmaru2.pngmaru1.pngmaru6.pngmaru5.pngmaru3.png
d) maru4.pngmaru2.pngmaru5.pngmaru6.pngmaru1.pngmaru3.png

answer

Leave a Comment

Question 78

Which of the following is a correct statement concerning maintaining integrity as a factor in information security for a payroll system?

a) A system operator changes the system configuration to reduce the processing time of the payroll system.
b) Pay statements are printed without fail by payday.
c) Unauthorized employees cannot rewrite salary data.
d) Unauthorized employees cannot read salary data

answer

Leave a Comment

Question 77

Which of the following is a correct statement concerning digital signature used for e-mails?

a) Digital signature cannot prevent an alteration of e-mail contents, but it can detect an alteration.
b) Digital signature can prevent an alteration of e-mail contents, but does not guarantee the confidentiality.
c) Digital signature guarantees the confidentiality of e-mail contents, but cannot prevent an alteration.
d) Digital signature guarantees the confidentiality of e-mail contents, and restores altered e-mail contents as well.

answer

Leave a Comment

Question 76

Which of the following is a correct statement concerning a cryptography system?

a) Because common key cryptography uses different keys for both the sender and receiver, it ensures a high level of confidentiality.
b) Common key cryptography uses different keys for each sender and receiver, key management will become difficult as the number of senders and receivers increases.
c) When encrypting messages using public key cryptography , key management become easier by disclosing a decryption key
d) In the case of public key cryptography , the key used for signatures can be disclosed.

answer

Leave a Comment

Question 75

Which statement correctly describes the atomicity in ACID characteristics of a transaction?

a) A consistent state of the database
b) Once a transaction is completed normally, the updated results are not lost even if a failure has occurred.
c) A transaction must end with its process having been completely performed or with its process having not been performed at all.
d) The result of multiple transactions executed concurrently is the same as when they are executed serially.

answer

Leave a Comment

Question 74

Which of the following is a correct statement concerning access to a database from an application program that runs the control of a TP monitor?

a) If the SQL search result is “No Data Found,” DBMS rollback will be executed.
b) An application program issues a commit and rollback instruction to a TP monitor, and the TP monitor issues instructions to DBMS.
c) An application program determines whether to commit or roll back its transaction after confirming the issuance of a commit or rollback instruction from another application program running under the control of a TP monitor.
d) An application program cannot issue an instruction to start a transaction. A TP monitor determines where to start a transaction.

answer

Leave a Comment

Older Posts »