Exam 12: Information Security and Computer Fraud
Exam 2: Accountants As Business Analysts52 Questions
Exam 3: Data Modeling50 Questions
Exam 4: Relational Databases and Enterprise System50 Questions
Exam 5: Sales and Collections Business Process36 Questions
Exam 6: Purchases and Payments Business Process37 Questions
Exam 7: Conversion Processes34 Questions
Exam 9: Data Analytics in Accounting30 Questions
Exam 10: Reporting Processes and Extensible Business Reporting Language XBRL12 Questions
Exam 11: Ais and Internal Controls55 Questions
Exam 12: Information Security and Computer Fraud52 Questions
Exam 13: Monitoring and Auditing Ais50 Questions
Exam 14: The Balanced Scorecard and Business Value of Information Technology40 Questions
Exam 15: Evaluating Ais Investments28 Questions
Exam 16: The Systems Development Life Cycle and Project Management: Addressing the Challenges of Building Ais Systems15 Questions
Select questions type
What is a digital signature? How could a digital signature ensure data integrity when conducting e-business?
(Essay)
4.9/5
(36)
A Certificate Authority (CA) issues digital certificates to bond the subscriber with a public key and a private key.
(True/False)
4.9/5
(43)
Which of the following statements is incorrect about digital signatures?
A. A digital signature can ensure data integrity.
B. A digital signature also authenticates the document creator.
C. A digital signature is an encrypted message digest.
D. A digital signature is a message digest encrypted using the document creator's public key.
(Short Answer)
4.8/5
(41)
A magnetic tape used to store data backups was lost while it was being transported to an offsite storage location. The data on the tape includes customers' credit card and personal information. Which preventive control(s) should have been used to minimize the potential loss?
(Short Answer)
4.8/5
(39)
A disaster recovery approach should include which of the following elements?
A. Encryption.
B. Firewalls.
C. Regular backups.
D. Surge protectors.
(Short Answer)
4.8/5
(43)
Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely?
A. A message digest.
B. A 16-bit encryption key.
C. A public key and a private key.
D. A digital signature.
(Short Answer)
4.9/5
(44)
Which of the following groups is responsible for conducting fraud risk assessment for an organization?
A. The External Auditor.
B. The Audit Committee.
C. The Internal Audit group.
D. Management.
(Short Answer)
4.9/5
(43)
The fraud triangle includes incentive, opportunity and an attitude to rationalize the fraud.
(True/False)
4.8/5
(40)
An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except:
A. Password management.
B. Data encryption
C. Digital certificates.
D. Batch processing.
(Short Answer)
4.8/5
(41)
An information technology director collected the names and locations of key vendors, current hardware configuration, names of team members, and an alternative processing location. What is the director most likely preparing?
A. Data restoration plan.
B. Disaster recovery plan.
C. System security policy.
D. System hardware policy.
(Short Answer)
4.8/5
(41)
Asymmetric-key encryption is suitable for encrypting large data sets or messages.
(True/False)
4.8/5
(32)
The goal of information security management is to enhance the confidence, integrity and authority (CIA) of a firm's information.
(True/False)
4.7/5
(41)
Showing 41 - 52 of 52
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)