Archive for Exam 2004 SW (AM)

Question 80

Which of the following statements correctly defines UCS-2 (Unicode)?

a) It is a code system mainly used under UNIX. It uses a single byte to represent an alphanumeric character and two bytes to represent a Chinese character.
b) It is a code system currently used in many personal computers. It uses a single byte to represent an alphanumeric character and two bytes to represent a Chinese character.
c) It is a code system that uses a single byte to represent all characters
d) It is a code system adaptable to coded character sets in many countries. It uses two bytes to represent all characters.

answer

Leave a Comment

Question 79

The framework for building a security management system specified in BS 7799-2 consists of steps through below. What is the correct order of these steps?

maru1.png Select and/or add management objectives and management measures to be implemented.
maru2.png Determine the scope of the information security management system.
maru3.png Create an implementation declaration.
maru4.png Define security policies.
maru5.png Conduct a risk assessment.
maru6.pngManage risks

a) maru3.pngmaru4.pngmaru2.pngmaru6.pngmaru5.pngmaru1.png
b) maru3.pngmaru4.pngmaru5.pngmaru6.pngmaru1.pngmaru2.png
c) maru4.pngmaru2.pngmaru1.pngmaru6.pngmaru5.pngmaru3.png
d) maru4.pngmaru2.pngmaru5.pngmaru6.pngmaru1.pngmaru3.png

answer

Leave a Comment

Question 78

Which of the following is a correct statement concerning maintaining integrity as a factor in information security for a payroll system?

a) A system operator changes the system configuration to reduce the processing time of the payroll system.
b) Pay statements are printed without fail by payday.
c) Unauthorized employees cannot rewrite salary data.
d) Unauthorized employees cannot read salary data

answer

Leave a Comment

Question 77

Which of the following is a correct statement concerning digital signature used for e-mails?

a) Digital signature cannot prevent an alteration of e-mail contents, but it can detect an alteration.
b) Digital signature can prevent an alteration of e-mail contents, but does not guarantee the confidentiality.
c) Digital signature guarantees the confidentiality of e-mail contents, but cannot prevent an alteration.
d) Digital signature guarantees the confidentiality of e-mail contents, and restores altered e-mail contents as well.

answer

Leave a Comment

Question 76

Which of the following is a correct statement concerning a cryptography system?

a) Because common key cryptography uses different keys for both the sender and receiver, it ensures a high level of confidentiality.
b) Common key cryptography uses different keys for each sender and receiver, key management will become difficult as the number of senders and receivers increases.
c) When encrypting messages using public key cryptography , key management become easier by disclosing a decryption key
d) In the case of public key cryptography , the key used for signatures can be disclosed.

answer

Leave a Comment

Question 75

Which statement correctly describes the atomicity in ACID characteristics of a transaction?

a) A consistent state of the database
b) Once a transaction is completed normally, the updated results are not lost even if a failure has occurred.
c) A transaction must end with its process having been completely performed or with its process having not been performed at all.
d) The result of multiple transactions executed concurrently is the same as when they are executed serially.

answer

Leave a Comment

Question 74

Which of the following is a correct statement concerning access to a database from an application program that runs the control of a TP monitor?

a) If the SQL search result is “No Data Found,” DBMS rollback will be executed.
b) An application program issues a commit and rollback instruction to a TP monitor, and the TP monitor issues instructions to DBMS.
c) An application program determines whether to commit or roll back its transaction after confirming the issuance of a commit or rollback instruction from another application program running under the control of a TP monitor.
d) An application program cannot issue an instruction to start a transaction. A TP monitor determines where to start a transaction.

answer

Leave a Comment

Question 73

Which of the following is a correct statement concerning the operation of a lock used for concurrent control of transactions?

a) A request for a shared lock will be granted if it is made while a shared lock is used.
b) A request for an exclusive lock will be granted if it is made while a shared lock is used.
c) A request for a shared lock will be granted if it is made while an exclusive lock is used
d) A request for an exclusive lock will be granted if it is made while an exclusive lock is used

answer

Leave a Comment

Question 72

Which of the following is a correct statement concerning the process privileges for objects in SQL?

a) There are three types of privileges: INSERT, DELETE, and UPDATE.
b) The privileges apply only to base tables, not to views.
c) The REVOKE statement revokes privileges.
d) The COMMIT statement grants privileges.

answer

Leave a Comment

Question 71

Which of the SQL statements below will retrieve persons of the same name from an “Employee” table?

Employee

Employee number Name Date of birth Department
0001 Kenji Arai 1950-02-04 Sales Department
0002 Taro Suzuki 1955-03-13 Administration Department
0003 Hiroshi Sato 1961-07-11 Technical Department
0004 Hiroshi Tanaka 1958-01-24 Planning Department
0005 Taro Suzuki 1948-11-09 Sales Department

a) SELECT DISTINCT Name FROM Employee ORDER BY Name
b) SELECT Name, COUNT (*) FROM Employee GROUP BY Name
c) SELECT Name FROM Employee GROUP BY Name HAVING COUNT (*) > 1
d) SELECT Name FROM Employee WHERE Name = Name

answer

Leave a Comment

Older Posts »