Exam 14: Information Security and Computer Fraud
Exam 1: Accounting Information Systems and Firm Value60 Questions
Exam 2: Accountants As Business Analysts53 Questions
Exam 3: Data Modeling53 Questions
Exam 4: Relational Databases and Enterprise Systems54 Questions
Exam 5: Sales and Collections Business Process35 Questions
Exam 6: Purchases and Payments Business Process36 Questions
Exam 7: Conversion Business Process38 Questions
Exam 9: Reporting Processes and Extensible Business Reporting Language Xbrl62 Questions
Exam 10: Data Analytics in Accounting: Concepts and the Amps Model38 Questions
Exam 11: Data Analytics in Accounting: Tools and Practice38 Questions
Exam 12: Emerging Technologies: Blockchain and Ai Automation39 Questions
Exam 13: Accounting Information Systems and Internal Controls60 Questions
Exam 14: Information Security and Computer Fraud58 Questions
Exam 15: Monitoring and Auditing Ais69 Questions
Exam 16: The Balanced Scorecard, Business Model Canvas, and Business Value of Information Technology46 Questions
Exam 17: Evaluating Ais Investments43 Questions
Select questions type
Which of the following is not an example of a vulnerability within an Information System?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
B
Which of the following statements about asymmetric-key encryption is correct?
Free
(Multiple Choice)
5.0/5
(31)
Correct Answer:
D
When client's accounts payable computer system was relocated,the administrator provided support through a dial-up connection to server.Subsequently,the administrator left the company.No changes were made to the accounts payable system at that time.Which of the following situations represents the greatest security risk?
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
C
Most companies use both symmetric-key and asymmetric-key encryption methods when conducting e-business.
(True/False)
4.8/5
(38)
Which of the following is not one of the common techniques for information security risks and attacks?
(Multiple Choice)
4.8/5
(31)
Hashing process can be reversed and it is used for maintaining data confidentiality.
(True/False)
4.9/5
(40)
Why do Certificate Authority (CA)play an important role in a company's information security management?
(Multiple Choice)
4.8/5
(40)
Information security is a critical factor in maintaining systems integrity.
(True/False)
5.0/5
(43)
Which of the following statements is incorrect about digital signatures?
(Multiple Choice)
4.8/5
(40)
What could result from the failure to audit and terminate unused accounts in a timely manner?
(Multiple Choice)
4.8/5
(46)
The symmetric-key encryption method is used to authenticate users.
(True/False)
4.8/5
(32)
Which of the following describes the primary goals of the CIA approach to information security management?
(Multiple Choice)
4.9/5
(41)
Which of the following statements regarding authentication in conducting e-business is incorrect?
(Multiple Choice)
4.8/5
(34)
Which of the following is not an example of a physical security vulnerability?
(Multiple Choice)
4.9/5
(43)
Which of the following is not an example of vulnerability within the process of IT operations?
(Multiple Choice)
4.9/5
(42)
Encryption is a preventive control ensuring data confidentiality and privacy during transmission and for storage.
(True/False)
4.8/5
(41)
Which of the following IT controls would best prevent a currency trader from concealing his/her trading errors?
(Multiple Choice)
4.9/5
(33)
For businesses considering a cloud computing solution,which of the following should they ask the cloud vendor to provide before entering into a contract for critical business operations?
(Multiple Choice)
4.8/5
(31)
A Certificate Authority (CA)issues digital certificates to bond the subscriber with a public key and a private key.
(True/False)
4.8/5
(42)
Showing 1 - 20 of 58
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)