Exam 14: Information Security and Computer Fraud
Exam 1: Accounting Information Systems and Firm Value60 Questions
Exam 2: Accountants As Business Analysts53 Questions
Exam 3: Data Modeling53 Questions
Exam 4: Relational Databases and Enterprise Systems54 Questions
Exam 5: Sales and Collections Business Process35 Questions
Exam 6: Purchases and Payments Business Process36 Questions
Exam 7: Conversion Business Process38 Questions
Exam 9: Reporting Processes and Extensible Business Reporting Language Xbrl62 Questions
Exam 10: Data Analytics in Accounting: Concepts and the Amps Model38 Questions
Exam 11: Data Analytics in Accounting: Tools and Practice38 Questions
Exam 12: Emerging Technologies: Blockchain and Ai Automation39 Questions
Exam 13: Accounting Information Systems and Internal Controls60 Questions
Exam 14: Information Security and Computer Fraud58 Questions
Exam 15: Monitoring and Auditing Ais69 Questions
Exam 16: The Balanced Scorecard, Business Model Canvas, and Business Value of Information Technology46 Questions
Exam 17: Evaluating Ais Investments43 Questions
Select questions type
A company's audit committee is solely responsible for fraud risk assessments.
(True/False)
4.8/5
(42)
To prevent invalid data input,a bank added an extra number at the end of each account number and subjected the new number to an algorithm.This technique is known as:
(Multiple Choice)
4.9/5
(40)
When computer programs or files can be accessed from terminals,users should be required to enter a(n):
(Multiple Choice)
4.7/5
(40)
Which of the following describes the recommended prerequisites for managing vulnerabilities?
(Multiple Choice)
4.8/5
(28)
Bacchus,Inc.is a large multinational corporation with various business units around the world.After a fire destroyed the corporation headquarters and largest manufacturing site,plans for which of the following would help Bacchus ensure a timely recovery?
(Multiple Choice)
4.8/5
(38)
Which of the following is not included in the remediation phase for vulnerability management?
(Multiple Choice)
4.7/5
(35)
The goal of information security management is to maintain confidentiality,integrity and availability of a firm's information.
(True/False)
5.0/5
(39)
Which of the following statements is most accurate with regard to business continuity management (BCM)and disaster recovery planning (DRP)?
(Multiple Choice)
4.8/5
(35)
Spam is a self-replicating program that runs and spreads by modifying other programs or files.
(True/False)
4.9/5
(26)
Which of the following statements is true regarding risk management and vulnerability management?
(Multiple Choice)
4.8/5
(39)
An information technology director collected the names and locations of key vendors,current hardware configuration,names of team members,and an alternative processing location.What is the director most likely preparing?
(Multiple Choice)
4.8/5
(33)
One type of fault tolerance is using redundant units to provide a system the ability to continue functioning when part of the system fails.
(True/False)
4.8/5
(30)
A Trojan Horse is a self-replicating,self-propagating,self-contained program that uses networking mechanisms to spread itself.
(True/False)
4.7/5
(44)
Asymmetric-key encryption is suitable for encrypting large data sets or messages.
(True/False)
4.8/5
(34)
Encryption is a control that changes plain text into which of the following?
(Multiple Choice)
4.9/5
(42)
Symmetric-key encryption is rarely used today due to key distribution and key management issues.
(True/False)
4.9/5
(33)
Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely?
(Multiple Choice)
4.8/5
(37)
Showing 41 - 58 of 58
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)