Exam 5: Security and Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All risks can be prevented.

Free
(True/False)
4.8/5
(28)
Correct Answer:
Verified

False

Determining the right level of security is a difficult balance. Explain.

Free
(Essay)
4.9/5
(30)
Correct Answer:
Verified

Too little security opens the company to attacks, while too much security slows system performance and can impact employee morale and customer satisfaction.

Describe what should be included in end-user computing policy.

Free
(Essay)
4.8/5
(39)
Correct Answer:
Verified

The policy should include items such as reminders that users must comply with corporate security policies and procedures, take care of corporate equipment, and use the company's computer resources and information only for authorized business purposes.
It also sets out responsibilities for backing up data, protecting against viruses, keeping passwords secret, and taking other precautions for protecting the privacy of corporate data.

Studies on stock prices of ebusiness entities have shown that security breaches involving access to confidential data and website outages are associated with significant stock price declines.

(True/False)
4.8/5
(26)

Lack of standards, regulations and rules, and support systems are examples of internal risks associated with new business models.

(True/False)
4.8/5
(36)

An access control technique used on the web to prevent unauthorized software from masquerading as a person, presenting a set of distorted squiggly letters and numbers that people can decipher but computers cannot is called ________.

(Multiple Choice)
4.8/5
(36)

The following are all examples of security controls except:

(Multiple Choice)
4.9/5
(35)

More than half the damage suffered in security breaches is caused by:

(Multiple Choice)
4.9/5
(35)

The use of electronic devices attached to transmission lines that can detect and capture data transmissions on those lines is called:

(Multiple Choice)
4.8/5
(37)

An International Development System (IDS) monitors devices and processes for security threats and can alert security personnel of the occurrence of unusual activity as it occurs.

(True/False)
4.9/5
(34)

The concept of non-repudiation refers to:

(Multiple Choice)
4.8/5
(40)

The annual report of Canadian Tire's financial activities contains a tag containing the time that it was created, modified and moved. This is an example of ________.

(Multiple Choice)
4.7/5
(35)

An employee created a new database system to track promotional materials and linked it into the ERP system. Soon after, the ERP system's inventory module suffered a crash. This crash is likely the result of ________.

(Multiple Choice)
4.9/5
(33)

When logging on to a network server, authentication would mean that:

(Multiple Choice)
4.9/5
(36)

Biometrics include all of the following except:

(Multiple Choice)
4.8/5
(39)

Which of the following would be part of the disaster recovery plan of a company?

(Multiple Choice)
4.8/5
(36)

There are two broad categories of controls. These are:

(Multiple Choice)
4.8/5
(36)

Logical access controls include locking the door to the server room.

(True/False)
4.9/5
(40)

The following is an example of an applications control:

(Multiple Choice)
4.9/5
(41)

Viruses can potentially result in:

(Multiple Choice)
4.8/5
(30)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)