Exam 14: Information Security and Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following best illustrates the use of multifactor authentication?

(Multiple Choice)
4.8/5
(41)

Which of the following does not represent a viable data backup method?

(Multiple Choice)
5.0/5
(38)

What is the primary objective of data security controls?

(Multiple Choice)
4.9/5
(38)

A Public Key Infrastructure (PKI)provides the ability to do which of the following?

(Multiple Choice)
4.9/5
(35)

Which of the following is not one of the main components of vulnerability management and assessment?

(Multiple Choice)
4.9/5
(41)

Disaster recovery planning and business continuity management are unrealted.

(True/False)
4.9/5
(45)

Key distribution and key management are problematic under the symmetric-key encryption.

(True/False)
4.8/5
(40)

Select a correct statement regarding encryption methods?

(Multiple Choice)
4.9/5
(42)

Encryption and hashing are similar process to maintain data confidentiality.

(True/False)
4.8/5
(31)

Which of the following is a password security weakness?

(Multiple Choice)
4.8/5
(29)

A disaster recovery approach should include which of the following elements?

(Multiple Choice)
4.9/5
(47)

A RAID array implemented in a data center is an example of which of the following?

(Multiple Choice)
4.7/5
(36)

The purpose of using a digital signature is for authentication.

(True/False)
4.8/5
(33)

An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except:

(Multiple Choice)
4.8/5
(30)

Why would companies want to use digital signatures when conducting e-business?

(Multiple Choice)
4.7/5
(32)

The goal of information security management is to enhance the confidence,integrity and authority (CIA)of a firm's information.

(True/False)
4.8/5
(47)

When using asymmetric encryption algorithm,for two trading parties to conduct e-business,they need to use two keys.

(True/False)
4.9/5
(32)

Which of the following controls would most likely assure that a company can reconstruct its financial records?

(Multiple Choice)
4.8/5
(39)

Both ISACA and the GTAG define vulnerability.Which of the following does not represent one of these definitions?

(Multiple Choice)
4.8/5
(39)

Which of the following IT controls would best prevent a developer from inappropriately accessing the system?

(Multiple Choice)
4.7/5
(36)
Showing 21 - 40 of 58
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)