筛选结果 共找出525

 A government department generates information which should not be disclosed to anyone who works outside of the department. There are many other government departments working within the same building. 

Which of the following would NOT be an effective control procedure for the generation and distribution of the information within the government department? 

A

 If working from home, departmental employees must use a memory stick to transfer data, as laptop computers are not allowed to leave the department. 

B

 All departmental employees must enter non-disclosed and regularly updated passwords to access their computers. 

C

 All authorised employees must swipe an officially issued, personal identity card at the entrance to the department before they can gain access. 

D

 All hard copies of confidential information must be shredded at the end of each day or locked overnight in a safe if needed again. 

 Which of the following methods would be LEAST effective in ensuring the security of confidential information? 

A

 Monitoring emails 

B

 Encryption of files 

C

 Dial back facility 

D

 Universal passwords 

 'Published data is always reliable.' 

A

True

B

False

This question appeared in the June 2015 exam. 

Which of the following is an external source of information? 

A

Value of sales, analysed for each customer 

B

Value of purchases, analysed for each supplier 

C

 Prices of similar products, analysed for each competitor company 

D

 Hours worked, analysed for each employee 

Which of the following is NOT an internal source of management information? 

A

 Personnel records 

B

 Production department records 

C

 Financial statements of competitors 

D

 Detailed time records 

 Data used by the management that has been obtained from an official government source is an example of: 

A

 External primary data 

B

 External secondary data 

C

 Internal primary data 

D

 Internal secondary data 

 The following statements have been made about data and information. 

(1) In-depth analysis of data on a database in order to identify undiscovered trends or patterns in the data is known as data mining.  

(2) Large public databases are a major source of feedback for many commercial organisations. 

Which of the above statements is/are true? 

A

 1 only 

B

 2 only 

C

 Neither 1 nor 2 

D

 Both 1 and 2 

 Which one of the following is often used to protect an intranet from unauthorised access by an external hacker? 

A

 Anti-virus software 

B

 Data encryption 

C

 Firewall 

D

 Passwords 

 Organisations have many sources they can use for external data. List six of these. 

 Choose the correct words from those highlighted. 

Logical/physical access control is concerned with preventing those who do not have access/already have access to a terminal or computer from gaining access to hardware/data or software.