Exam 14: Information Security and Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not an example of a vulnerability within an Information System?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

B

Which of the following statements about asymmetric-key encryption is correct?

Free
(Multiple Choice)
5.0/5
(31)
Correct Answer:
Verified

D

When client's accounts payable computer system was relocated,the administrator provided support through a dial-up connection to server.Subsequently,the administrator left the company.No changes were made to the accounts payable system at that time.Which of the following situations represents the greatest security risk?

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

C

Most companies use both symmetric-key and asymmetric-key encryption methods when conducting e-business.

(True/False)
4.8/5
(38)

Which of the following is not one of the common techniques for information security risks and attacks?

(Multiple Choice)
4.8/5
(31)

Hashing process can be reversed and it is used for maintaining data confidentiality.

(True/False)
4.9/5
(40)

Why do Certificate Authority (CA)play an important role in a company's information security management?

(Multiple Choice)
4.8/5
(40)

Information security is a critical factor in maintaining systems integrity.

(True/False)
5.0/5
(43)

Select a correct statement regarding a hashing process.

(Multiple Choice)
4.7/5
(36)

Which of the following statements is incorrect about digital signatures?

(Multiple Choice)
4.8/5
(40)

What could result from the failure to audit and terminate unused accounts in a timely manner?

(Multiple Choice)
4.8/5
(46)

The symmetric-key encryption method is used to authenticate users.

(True/False)
4.8/5
(32)

Which of the following describes the primary goals of the CIA approach to information security management?

(Multiple Choice)
4.9/5
(41)

Which of the following statements regarding authentication in conducting e-business is incorrect?

(Multiple Choice)
4.8/5
(34)

Which of the following is not an example of a physical security vulnerability?

(Multiple Choice)
4.9/5
(43)

Which of the following is not an example of vulnerability within the process of IT operations?

(Multiple Choice)
4.9/5
(42)

Encryption is a preventive control ensuring data confidentiality and privacy during transmission and for storage.

(True/False)
4.8/5
(41)

Which of the following IT controls would best prevent a currency trader from concealing his/her trading errors?

(Multiple Choice)
4.9/5
(33)

For businesses considering a cloud computing solution,which of the following should they ask the cloud vendor to provide before entering into a contract for critical business operations?

(Multiple Choice)
4.8/5
(31)

A Certificate Authority (CA)issues digital certificates to bond the subscriber with a public key and a private key.

(True/False)
4.8/5
(42)
Showing 1 - 20 of 58
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)