Exam 11: Information Security and Computer Fraud
Exam 1: Accounting Information Systems and Firm Value62 Questions
Exam 2: Accountants As Business Analysts43 Questions
Exam 3: Data Modeling45 Questions
Exam 4: Relational Databases and Enterprise Systems48 Questions
Exam 5: Sales and Collections Business Process25 Questions
Exam 6: Purchases and Payments Business Process15 Questions
Exam 7: Conversion Business Process18 Questions
Exam 9: Reporting Processes and Extensible Business Reporting Language XBRL50 Questions
Exam 10: Accounting Information Systems and Internal Controls57 Questions
Exam 11: Information Security and Computer Fraud47 Questions
Exam 12: Monitoring and Auditing AIS48 Questions
Exam 13: The Balanced Scorecard and Business Value of Information Technology27 Questions
Exam 14: Evaluating AIS Investments25 Questions
Exam 15: The Systems Development Life Cycle and Project Management: Addressing the Challenges of Building Ais Systems45 Questions
Select questions type
Which of the following is not included in the remediation phrase for vulnerability management?
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
C
The goal of information security management is to maintain confidentiality,integrity and availability of a firm's information.
Free
(True/False)
4.8/5
(42)
Correct Answer:
True
Which of the following statement present an example of a general control for a computerized system?
Free
(Multiple Choice)
4.8/5
(51)
Correct Answer:
D
An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except:
(Multiple Choice)
4.9/5
(29)
Which of the following controls would most likely assure that a company can reconstruct its financial records?
(Multiple Choice)
4.8/5
(42)
Why would companies want to use digital signatures when conducting e-business?
(Multiple Choice)
4.8/5
(44)
A company's audit committee is responsible for fraud risk assessments.
(True/False)
4.8/5
(46)
Which of the following statements is incorrect about digital signature?
(Multiple Choice)
4.8/5
(37)
Which of the following statements about asymmetric-key encryption is correct?
(Multiple Choice)
4.8/5
(45)
What is a digital signature? How could a digital signature ensure data integrity when conducting e-business?
B.
6) Receiver B receives the package and decrypts it using Receiver B's private key. Receiver B now has the document and Sender A's digital signature.
7) Receiver B decrypts Sender A's digital signature using Sender A's public key to get the sent-over MD. Receiver B also authenticates that Sender A is the document creator.
8) Receiver B makes a copy of the received document and uses SHA-256 to hash the copy and get a calculated MD.
9) If the sent-over MD is the same as the calculated MD, Receiver B ensures data integrity.
(Essay)
4.9/5
(33)
List the following steps regarding computer fraud risk assessments in sequence.
(a)Assessing the likelihood and business impact of a control failure and/or a fraud incident.
(b)Mapping existing controls to potential fraud schemes and identifying gaps.
(c)Identifying potential IT fraud schemes and prioritizing them based on likelihood and impact.
(d)Identifying relevant IT fraud risk factors.
(e)Testing operating effectiveness of fraud prevention and detection controls.
(Short Answer)
4.8/5
(35)
Asymmetric-key encryption is suitable for encrypting large data sets or messages.
(True/False)
4.7/5
(39)
Which of the following outcomes is a likely benefit of information technology used for internal control?
(Multiple Choice)
4.8/5
(47)
Why do Certificate Authority (CA)play an important role in a company's information security management?
(Multiple Choice)
4.8/5
(40)
Which of the following does not represent a viable data backup method?
(Multiple Choice)
4.9/5
(31)
To prevent invalid data input,a bank added an extra number at the end of each account number and subjected the new number to an algorithm.This technique is known as:
(Multiple Choice)
4.8/5
(35)
In a large multinational organization,which of the following job responsibilities should be assigned to be network administrator?
(Multiple Choice)
4.9/5
(33)
The goal of information security management is to enhance the confidence,integrity and authority (CIA)of a firm's management.
TRUE
(Short Answer)
4.9/5
(33)
Showing 1 - 20 of 47
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)