MCQ for CA Intermediate EIS & SM - PART 1 - ENTERPRISE INFORMATION SYSTEMS - Chapter 3 - INFORMATION SYSTEMS AND ITS COMPONENTS

Sample Multiple Choice Questions (MCQ's) for CA Intermediate - Paper 7 - ENTERPRISE INFORMATION SYSTEMS & STRATEGIC MANAGEMENT - PART 2 - ENTERPRISE INFORMATION SYSTEMS - Chapter 3: INFORMATION SYSTEMS AND ITS COMPONENTS - For Practice relevant for Dec 22 and May/June 23 Examinations

Q:1 The XYZ Systems initially used IBM Information Management system which used a hierarchical database model. Which type of relationship is not supported by such database model?

  1. One-to-One
  2. Many-to-One
  3. One-to-Many
  4. None of the above

Answer: 2

Q:2 The XYZ Systems recently shifted to the SQL Server DBMS from the IBM Information Management system that it previously used. Under which aspect, the SQL Server differs from IBM Information Management System?

  1. One-to-one relationship
  2. One-to-many relationship
  3. Relational Database structure
  4. None of the above

Answer: 3

Q:3 Which among the following is not an advantage of the SQL Server DBMS?

  1. Data Sharing
  2. Data Redundancy
  3. Program and File consistency
  4. None of the above

Answer: 3

Q:4 To ensure that the communication between their private network and public network is secured, one of the step taken by XYZ Systems are to install firewall. The installation of firewall is __________type of control.

  1. Preventive
  2. Corrective
  3. Detective
  4. None of the above

Answer: 1

Q:5 XYZ Systems made its access privileges more stringent so as to prevent unauthorized users gaining entry into secured area and also minimum entry granted to users based on their job requirements. Which of the following Logical Access control covers this aspect?

  1. Operating System Access Control
  2. Network Access Controls
  3. User Access Management
  4. Application and Monitoring System control

Answer: 3

Q:6 Based on the risk assessment by the audit team, the management of XYZ Systems decided to specify the exact path of the internet access by routing the internet access by the employees through a firewall and proxy. This is referred to as_______.

  1. Encryption
  2. Enforced Path
  3. Call Back Devices
  4. None of these

Answer: 2

CA Intermediate EIS & SM - PART 1 - ENTERPRISE INFORMATION SYSTEMS - MCQ for Chapter 4 -   

To get back to the Chapterwise MCQ List Page       

 

Hope you can find this article helpful. If you did like the content then Share it with your friends who are preparing for CA Inter Exams or who will be giving their CA Inter Exams in the near future.