Exam 12: Information Security and Computer Fraud
Exam 2: Accountants As Business Analysts52 Questions
Exam 3: Data Modeling50 Questions
Exam 4: Relational Databases and Enterprise System50 Questions
Exam 5: Sales and Collections Business Process36 Questions
Exam 6: Purchases and Payments Business Process37 Questions
Exam 7: Conversion Processes34 Questions
Exam 9: Data Analytics in Accounting30 Questions
Exam 10: Reporting Processes and Extensible Business Reporting Language XBRL12 Questions
Exam 11: Ais and Internal Controls55 Questions
Exam 12: Information Security and Computer Fraud52 Questions
Exam 13: Monitoring and Auditing Ais50 Questions
Exam 14: The Balanced Scorecard and Business Value of Information Technology40 Questions
Exam 15: Evaluating Ais Investments28 Questions
Exam 16: The Systems Development Life Cycle and Project Management: Addressing the Challenges of Building Ais Systems15 Questions
Select questions type
Information security is a critical factor in maintaining systems integrity.
Free
(True/False)
4.8/5
(44)
Correct Answer:
True
To prevent invalid data input, a bank added an extra number at the end of each account number and subjected the new number to an algorithm. This technique is known as:
A. A validation check.
B. check digit verification
C. A dependency check.
D. A format check.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
check digitverification
Which of the following does not represent a viable data backup method?
A. Disaster recovery plan
B. Redundant arrays of independent drives
C. Virtualization
D. Cloud computing
Free
(Short Answer)
4.9/5
(40)
Correct Answer:
Disaster recovery plan
A RAID array implemented in a data center is an example of which of the following?
A. Virtualization.
B. Uninterruptible power supply.
C. Fault tolerance.
D. SOC 3.
(Short Answer)
4.8/5
(43)
Which of the following statements is true regarding risk management and vulnerability management?
A. They both have the objective of reducing the likelihood that detrimental events occur.
B. Risk management is often conducted using an IT asset-based approach.
C. Vulnerability management is more complex and strategic.
D. Both approaches involve processes that typically take many months or years to complete.
(Short Answer)
4.8/5
(35)
Why do Certificate Authority (CA) play an important role in a company's information security management?
A. Using a CA is required by SOX in managing information security.
B. Most companies use CA to manage their employees' public keys.
C. CA creates and maintains both the public and private keys for a company's employees.
D. None of the above is correct.
(Short Answer)
4.8/5
(32)
Which of the following statement present an example of a general control for a computerized system?
A. Limiting entry of sales transactions to only valid credit customers.
B. Creating hash totals from social security number for the weekly payroll
C. Restricting entry of accounts payable transactions to only authorized users.
D. Restricting access to the computer center by use of biometric devices.
(Short Answer)
4.8/5
(34)
Which of the following describes the primary goals of the CIA approach to information security management?
A. Controls, Innovation, Analysis.
B. Confidentiality, Integrity, Availability.
C. Convenience, Integrity, Awareness.
D. Confidentiality, Innovation, Availability.
(Short Answer)
4.8/5
(33)
Encryption and hashing are similar process to maintain data confidentiality.
(True/False)
4.8/5
(45)
Encryption is a preventive control ensuring data confidentiality and privacy during transmission and for storage.
(True/False)
4.8/5
(31)
Which of the following outcomes is a likely benefit of information technology used for internal control?
A. Processing of unusual or nonrecurring transactions.
B. Enhanced timeliness of information.
C. Potential loss of data.
D. Recording of unauthorized transactions.
(Short Answer)
4.7/5
(35)
One type of fault tolerance is using redundant units to provide a system the ability to continue functioning when part of the system fails.
(True/False)
4.8/5
(45)
Which of the following describes the recommended prerequisites for managing vulnerabilities?
A. Implement the COSO ERM framework, and identify key vulnerabilities.
B. Determine the main objective of vulnerability management, and assign roles and responsibilities.
C. Identify the key vulnerabilities, and implement appropriate controls to minimize the vulnerabilities.
D. Implement suitable controls, and assess those controls for potential vulnerabilities.
(Short Answer)
4.7/5
(33)
Disaster recovery planning and business continuity management are preventive controls.
(True/False)
4.7/5
(40)
Encryption is a control that changes plain text into which of the following?
A. Cyberspace.
B. Cryptext.
C. Mnemonic code.
D. Cyphertext.
(Short Answer)
4.7/5
(33)
When computer programs or files can be accessed from terminals, users should be required to enter a(n)
A. Parity check.
B. Password as a personal identification code.
C. Check digit.
D. Echo check.
(Short Answer)
5.0/5
(42)
Which of the following is not one of the main components of vulnerability management and assessment?
A. Identification.
B. Remediation.
C. Internalization.
D. Maintenance.
(Short Answer)
5.0/5
(44)
Which of the following best illustrates the use of multifactor authentication?
A. Requiring password changes every 30, 60, or 90 days.
B. Requiring the use of a smart card and a password.
C. Requiring the use of upper case, lower case, numeric, and special characters for a password.
D. The use of a fingerprint scanner for access to a device.
(Short Answer)
4.9/5
(36)
Integrity of information means the information is:
A. Accurate
B. Complete
C. Accessible
D. A and B are correct.
(Short Answer)
4.8/5
(40)
Showing 1 - 20 of 52
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)