Exam 11: Information Security and Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not included in the remediation phrase for vulnerability management?

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

C

The goal of information security management is to maintain confidentiality,integrity and availability of a firm's information.

Free
(True/False)
4.8/5
(42)
Correct Answer:
Verified

True

Which of the following statement present an example of a general control for a computerized system?

Free
(Multiple Choice)
4.8/5
(51)
Correct Answer:
Verified

D

An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except:

(Multiple Choice)
4.9/5
(29)

Integrity of information means the information is:

(Multiple Choice)
4.8/5
(36)

Which of the following controls would most likely assure that a company can reconstruct its financial records?

(Multiple Choice)
4.8/5
(42)

Why would companies want to use digital signatures when conducting e-business?

(Multiple Choice)
4.8/5
(44)

A company's audit committee is responsible for fraud risk assessments.

(True/False)
4.8/5
(46)

Which of the following statements is incorrect about digital signature?

(Multiple Choice)
4.8/5
(37)

Which of the following statements about asymmetric-key encryption is correct?

(Multiple Choice)
4.8/5
(45)

What is a digital signature? How could a digital signature ensure data integrity when conducting e-business? B. 6) Receiver B receives the package and decrypts it using Receiver B's private key. Receiver B now has the document and Sender A's digital signature. 7) Receiver B decrypts Sender A's digital signature using Sender A's public key to get the sent-over MD. Receiver B also authenticates that Sender A is the document creator. 8) Receiver B makes a copy of the received document and uses SHA-256 to hash the copy and get a calculated MD. 9) If the sent-over MD is the same as the calculated MD, Receiver B ensures data integrity.

(Essay)
4.9/5
(33)

List the following steps regarding computer fraud risk assessments in sequence. (a)Assessing the likelihood and business impact of a control failure and/or a fraud incident. (b)Mapping existing controls to potential fraud schemes and identifying gaps. (c)Identifying potential IT fraud schemes and prioritizing them based on likelihood and impact. (d)Identifying relevant IT fraud risk factors. (e)Testing operating effectiveness of fraud prevention and detection controls.

(Short Answer)
4.8/5
(35)

Asymmetric-key encryption is suitable for encrypting large data sets or messages.

(True/False)
4.7/5
(39)

Which of the following outcomes is a likely benefit of information technology used for internal control?

(Multiple Choice)
4.8/5
(47)

Why do Certificate Authority (CA)play an important role in a company's information security management?

(Multiple Choice)
4.8/5
(40)

Which of the following does not represent a viable data backup method?

(Multiple Choice)
4.9/5
(31)

To prevent invalid data input,a bank added an extra number at the end of each account number and subjected the new number to an algorithm.This technique is known as:

(Multiple Choice)
4.8/5
(35)

In a large multinational organization,which of the following job responsibilities should be assigned to be network administrator?

(Multiple Choice)
4.9/5
(33)

Which of the following statements is incorrect?

(Multiple Choice)
4.7/5
(43)

The goal of information security management is to enhance the confidence,integrity and authority (CIA)of a firm's management. TRUE

(Short Answer)
4.9/5
(33)
Showing 1 - 20 of 47
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)