Exam 14: Information Security and Computer Fraud
Exam 1: Accounting Information Systems and Firm Value60 Questions
Exam 2: Accountants As Business Analysts53 Questions
Exam 3: Data Modeling53 Questions
Exam 4: Relational Databases and Enterprise Systems54 Questions
Exam 5: Sales and Collections Business Process35 Questions
Exam 6: Purchases and Payments Business Process36 Questions
Exam 7: Conversion Business Process38 Questions
Exam 9: Reporting Processes and Extensible Business Reporting Language Xbrl62 Questions
Exam 10: Data Analytics in Accounting: Concepts and the Amps Model38 Questions
Exam 11: Data Analytics in Accounting: Tools and Practice38 Questions
Exam 12: Emerging Technologies: Blockchain and Ai Automation39 Questions
Exam 13: Accounting Information Systems and Internal Controls60 Questions
Exam 14: Information Security and Computer Fraud58 Questions
Exam 15: Monitoring and Auditing Ais69 Questions
Exam 16: The Balanced Scorecard, Business Model Canvas, and Business Value of Information Technology46 Questions
Exam 17: Evaluating Ais Investments43 Questions
Select questions type
Which of the following best illustrates the use of multifactor authentication?
(Multiple Choice)
4.8/5
(41)
Which of the following does not represent a viable data backup method?
(Multiple Choice)
5.0/5
(38)
A Public Key Infrastructure (PKI)provides the ability to do which of the following?
(Multiple Choice)
4.9/5
(35)
Which of the following is not one of the main components of vulnerability management and assessment?
(Multiple Choice)
4.9/5
(41)
Disaster recovery planning and business continuity management are unrealted.
(True/False)
4.9/5
(45)
Key distribution and key management are problematic under the symmetric-key encryption.
(True/False)
4.8/5
(40)
Encryption and hashing are similar process to maintain data confidentiality.
(True/False)
4.8/5
(31)
A disaster recovery approach should include which of the following elements?
(Multiple Choice)
4.9/5
(47)
A RAID array implemented in a data center is an example of which of the following?
(Multiple Choice)
4.7/5
(36)
An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except:
(Multiple Choice)
4.8/5
(30)
Why would companies want to use digital signatures when conducting e-business?
(Multiple Choice)
4.7/5
(32)
The goal of information security management is to enhance the confidence,integrity and authority (CIA)of a firm's information.
(True/False)
4.8/5
(47)
When using asymmetric encryption algorithm,for two trading parties to conduct e-business,they need to use two keys.
(True/False)
4.9/5
(32)
Which of the following controls would most likely assure that a company can reconstruct its financial records?
(Multiple Choice)
4.8/5
(39)
Both ISACA and the GTAG define vulnerability.Which of the following does not represent one of these definitions?
(Multiple Choice)
4.8/5
(39)
Which of the following IT controls would best prevent a developer from inappropriately accessing the system?
(Multiple Choice)
4.7/5
(36)
Showing 21 - 40 of 58
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)