Exam 12: Information Security and Computer Fraud

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

What is a digital signature? How could a digital signature ensure data integrity when conducting e-business?

(Essay)
4.9/5
(36)

A Certificate Authority (CA) issues digital certificates to bond the subscriber with a public key and a private key.

(True/False)
4.9/5
(43)

Which of the following statements is incorrect about digital signatures? A. A digital signature can ensure data integrity. B. A digital signature also authenticates the document creator. C. A digital signature is an encrypted message digest. D. A digital signature is a message digest encrypted using the document creator's public key.

(Short Answer)
4.8/5
(41)

A magnetic tape used to store data backups was lost while it was being transported to an offsite storage location. The data on the tape includes customers' credit card and personal information. Which preventive control(s) should have been used to minimize the potential loss?

(Short Answer)
4.8/5
(39)

A disaster recovery approach should include which of the following elements? A. Encryption. B. Firewalls. C. Regular backups. D. Surge protectors.

(Short Answer)
4.8/5
(43)

Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely? A. A message digest. B. A 16-bit encryption key. C. A public key and a private key. D. A digital signature.

(Short Answer)
4.9/5
(44)

Which of the following groups is responsible for conducting fraud risk assessment for an organization? A. The External Auditor. B. The Audit Committee. C. The Internal Audit group. D. Management.

(Short Answer)
4.9/5
(43)

The fraud triangle includes incentive, opportunity and an attitude to rationalize the fraud.

(True/False)
4.8/5
(40)

An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except: A. Password management. B. Data encryption C. Digital certificates. D. Batch processing.

(Short Answer)
4.8/5
(41)

An information technology director collected the names and locations of key vendors, current hardware configuration, names of team members, and an alternative processing location. What is the director most likely preparing? A. Data restoration plan. B. Disaster recovery plan. C. System security policy. D. System hardware policy.

(Short Answer)
4.8/5
(41)

Asymmetric-key encryption is suitable for encrypting large data sets or messages.

(True/False)
4.8/5
(32)

The goal of information security management is to enhance the confidence, integrity and authority (CIA) of a firm's information.

(True/False)
4.7/5
(41)
Showing 41 - 52 of 52
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)