Exam 8: Controlling Information Systems: Introduction to Pervasive Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The policy of requiring an employee to alternate jobs periodically is known as ______________________________.

(Short Answer)
4.9/5
(39)

Personnel development control plans consist of each of the following except:

(Multiple Choice)
4.7/5
(36)

Forced vacations is a policy of requiring an employee to take leave from the job and substitute another employee in his or her place.

(True/False)
4.9/5
(38)

Which one of the following personnel is not involved in safeguarding resources resulting from consummating events?

(Multiple Choice)
4.8/5
(31)

Computer hacking and cracking is the intentional, unauthorized access to an organization's computer system, accomplished by bypassing the system's access security controls.

(True/False)
4.9/5
(42)

Quality assurance function:

(Multiple Choice)
4.9/5
(29)

The disaster recovery strategy known as a cold site is a fully equipped data center that is made available to client companies for a monthly subscriber fee.

(True/False)
4.9/5
(31)

A(n) ______________________________ indemnifies a company in case it suffers losses from defalcations committed by its employees.

(Short Answer)
4.9/5
(35)

The department or function that develops and operates an organization's information systems is often called the:

(Multiple Choice)
4.7/5
(34)

The trust service principle of processing ______________________________ determines whether processing is complete, accurate, timely and authorized.

(Short Answer)
4.9/5
(36)

The ______________________________ maintains custody of and controls access to programs, files, and documentation.

(Short Answer)
4.9/5
(33)

Which of the following has the responsibility to ensure the security of all IT resources?

(Multiple Choice)
4.8/5
(31)

The primary reasons for performing regular employee performance reviews include all of the following except:

(Multiple Choice)
4.7/5
(40)

Embezzlement is a fraud committed by two or more individuals or departments.

(True/False)
4.9/5
(37)

Personnel termination control plans might include all of the following except:

(Multiple Choice)
4.8/5
(32)

Searching through rubbish for system information such as passwords is called:

(Multiple Choice)
4.9/5
(36)

A policy that requires employees to alternate jobs periodically is called:

(Multiple Choice)
4.7/5
(44)

In a logic bomb attack, a Web site is overwhelmed by an intentional onslaught of thousands of simultaneous messages, making it impossible for the attacked site to engage in its normal activities.

(True/False)
4.8/5
(31)

______________________________ identification systems identify authorized personnel through some unique physical trait such as fingers, hands, voice, eyes, face, and writing dynamics.

(Short Answer)
4.8/5
(44)

Which of the following personnel security control plans is corrective in nature as opposed to being a preventive or detective control plan?

(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 159
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)