Exam 12: Information Security and Computer Fraud

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Information security is a critical factor in maintaining systems integrity.

Free
(True/False)
4.8/5
(44)
Correct Answer:
Verified

True

To prevent invalid data input, a bank added an extra number at the end of each account number and subjected the new number to an algorithm. This technique is known as: A. A validation check. B. check digit verification C. A dependency check. D. A format check.

Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Verified

check digitverification

Which of the following does not represent a viable data backup method? A. Disaster recovery plan B. Redundant arrays of independent drives C. Virtualization D. Cloud computing

Free
(Short Answer)
4.9/5
(40)
Correct Answer:
Verified

Disaster recovery plan

A RAID array implemented in a data center is an example of which of the following? A. Virtualization. B. Uninterruptible power supply. C. Fault tolerance. D. SOC 3.

(Short Answer)
4.8/5
(43)

Which of the following statements is true regarding risk management and vulnerability management? A. They both have the objective of reducing the likelihood that detrimental events occur. B. Risk management is often conducted using an IT asset-based approach. C. Vulnerability management is more complex and strategic. D. Both approaches involve processes that typically take many months or years to complete.

(Short Answer)
4.8/5
(35)

Why do Certificate Authority (CA) play an important role in a company's information security management? A. Using a CA is required by SOX in managing information security. B. Most companies use CA to manage their employees' public keys. C. CA creates and maintains both the public and private keys for a company's employees. D. None of the above is correct.

(Short Answer)
4.8/5
(32)

Which of the following statement present an example of a general control for a computerized system? A. Limiting entry of sales transactions to only valid credit customers. B. Creating hash totals from social security number for the weekly payroll C. Restricting entry of accounts payable transactions to only authorized users. D. Restricting access to the computer center by use of biometric devices.

(Short Answer)
4.8/5
(34)

Which of the following describes the primary goals of the CIA approach to information security management? A. Controls, Innovation, Analysis. B. Confidentiality, Integrity, Availability. C. Convenience, Integrity, Awareness. D. Confidentiality, Innovation, Availability.

(Short Answer)
4.8/5
(33)

Encryption and hashing are similar process to maintain data confidentiality.

(True/False)
4.8/5
(45)

Encryption is a preventive control ensuring data confidentiality and privacy during transmission and for storage.

(True/False)
4.8/5
(31)

Which of the following outcomes is a likely benefit of information technology used for internal control? A. Processing of unusual or nonrecurring transactions. B. Enhanced timeliness of information. C. Potential loss of data. D. Recording of unauthorized transactions.

(Short Answer)
4.7/5
(35)

One type of fault tolerance is using redundant units to provide a system the ability to continue functioning when part of the system fails.

(True/False)
4.8/5
(45)

Which of the following describes the recommended prerequisites for managing vulnerabilities? A. Implement the COSO ERM framework, and identify key vulnerabilities. B. Determine the main objective of vulnerability management, and assign roles and responsibilities. C. Identify the key vulnerabilities, and implement appropriate controls to minimize the vulnerabilities. D. Implement suitable controls, and assess those controls for potential vulnerabilities.

(Short Answer)
4.7/5
(33)

What are the two prerequisites for vulnerability management?

(Essay)
4.9/5
(29)

Disaster recovery planning and business continuity management are preventive controls.

(True/False)
4.7/5
(40)

Encryption is a control that changes plain text into which of the following? A. Cyberspace. B. Cryptext. C. Mnemonic code. D. Cyphertext.

(Short Answer)
4.7/5
(33)

When computer programs or files can be accessed from terminals, users should be required to enter a(n) A. Parity check. B. Password as a personal identification code. C. Check digit. D. Echo check.

(Short Answer)
5.0/5
(42)

Which of the following is not one of the main components of vulnerability management and assessment? A. Identification. B. Remediation. C. Internalization. D. Maintenance.

(Short Answer)
5.0/5
(44)

Which of the following best illustrates the use of multifactor authentication? A. Requiring password changes every 30, 60, or 90 days. B. Requiring the use of a smart card and a password. C. Requiring the use of upper case, lower case, numeric, and special characters for a password. D. The use of a fingerprint scanner for access to a device.

(Short Answer)
4.9/5
(36)

Integrity of information means the information is: A. Accurate B. Complete C. Accessible D. A and B are correct.

(Short Answer)
4.8/5
(40)
Showing 1 - 20 of 52
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)