Submitted By aiel
UNIVERSITI TEKNOLOGI MARA
DEC 2012 – APR 2013
INSTRUCTIONS TO CANDIDATES
Answer ALL questions.
Start each answer on a new page.
Do not bring any material into the examination room unless permission is given by the invigilator.
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This test paper consists of 8 printed pages
This part consists of 20 multiple-choice questions. Choose the most suitable answer and shades the corresponding alphabet representing the answer.
1. Among the objectives of an operating system are as follows EXCEPT
the operating system must protect itself from users the operating system must protect users from each other the operating system must protect users from themselves the operating system must be totally free from errors
2. One of the criteria for accessing the firewall effectiveness is _______________
3. Electronic fund transfer is adopted by EDI trading partners due to implication on
Audit trails of transactions
Cash disbursement and receipts
Complexity of product delivery
High cost running the EDI maintenances
4. The following are common types of denial of services attack EXCEPT
SYN flood attack
Distributed denial of services
5. The modular design in PC systems provides users with some degree of flexibility in tailoring systems to their specific needs. Which of the…...