Exam 14: Information Security and Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A company's audit committee is solely responsible for fraud risk assessments.

(True/False)
4.8/5
(42)

To prevent invalid data input,a bank added an extra number at the end of each account number and subjected the new number to an algorithm.This technique is known as:

(Multiple Choice)
4.9/5
(40)

When computer programs or files can be accessed from terminals,users should be required to enter a(n):

(Multiple Choice)
4.7/5
(40)

Which of the following describes the recommended prerequisites for managing vulnerabilities?

(Multiple Choice)
4.8/5
(28)

Bacchus,Inc.is a large multinational corporation with various business units around the world.After a fire destroyed the corporation headquarters and largest manufacturing site,plans for which of the following would help Bacchus ensure a timely recovery?

(Multiple Choice)
4.8/5
(38)

Which of the following statements is incorrect?

(Multiple Choice)
4.9/5
(41)

Which of the following is not included in the remediation phase for vulnerability management?

(Multiple Choice)
4.7/5
(35)

The goal of information security management is to maintain confidentiality,integrity and availability of a firm's information.

(True/False)
5.0/5
(39)

Which of the following statements is most accurate with regard to business continuity management (BCM)and disaster recovery planning (DRP)?

(Multiple Choice)
4.8/5
(35)

Spam is a self-replicating program that runs and spreads by modifying other programs or files.

(True/False)
4.9/5
(26)

Which of the following statements is true regarding risk management and vulnerability management?

(Multiple Choice)
4.8/5
(39)

An information technology director collected the names and locations of key vendors,current hardware configuration,names of team members,and an alternative processing location.What is the director most likely preparing?

(Multiple Choice)
4.8/5
(33)

One type of fault tolerance is using redundant units to provide a system the ability to continue functioning when part of the system fails.

(True/False)
4.8/5
(30)

A Trojan Horse is a self-replicating,self-propagating,self-contained program that uses networking mechanisms to spread itself.

(True/False)
4.7/5
(44)

Asymmetric-key encryption is suitable for encrypting large data sets or messages.

(True/False)
4.8/5
(34)

Encryption is a control that changes plain text into which of the following?

(Multiple Choice)
4.9/5
(42)

Symmetric-key encryption is rarely used today due to key distribution and key management issues.

(True/False)
4.9/5
(33)

Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely?

(Multiple Choice)
4.8/5
(37)
Showing 41 - 58 of 58
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)