Overall paper was easy
Mcqs mostly from past paper
According to ―Booch object has following three components
Both software objects and real time objects have__________
A schematic representation of a sequence of operations as in a manufacturing process or
computer program is called
components of Intrusion Detection System (IDS).
symbols of DFD and ERD , flow chart
Audit trails is used for
some action or event that can lead to a loss?
CSF and KPI
some thing related to privacy
masquerading, spoofing, trojan horse, virus and worm, piggybacking
Consumer-to-consumer (c2c) explain 3 mark
Logical Threat 2 mark
how IT security officer detect/monitor intrusion in the database system? 5 mark
differentiate E commerce and E business with respect to financial transaction.
Three symbols, connector, off page connector, predefined process
information assets 5 mark
Best of luck
I require MTH 302 current paper , if any body knows please share it