Exam 11: Information Security and Computer Fraud
Exam 1: Accounting Information Systems and Firm Value62 Questions
Exam 2: Accountants As Business Analysts43 Questions
Exam 3: Data Modeling45 Questions
Exam 4: Relational Databases and Enterprise Systems48 Questions
Exam 5: Sales and Collections Business Process25 Questions
Exam 6: Purchases and Payments Business Process15 Questions
Exam 7: Conversion Business Process18 Questions
Exam 9: Reporting Processes and Extensible Business Reporting Language XBRL50 Questions
Exam 10: Accounting Information Systems and Internal Controls57 Questions
Exam 11: Information Security and Computer Fraud47 Questions
Exam 12: Monitoring and Auditing AIS48 Questions
Exam 13: The Balanced Scorecard and Business Value of Information Technology27 Questions
Exam 14: Evaluating AIS Investments25 Questions
Exam 15: The Systems Development Life Cycle and Project Management: Addressing the Challenges of Building Ais Systems45 Questions
Select questions type
Fraud triangle includes incentive,opportunity and an attitude to rationalize the fraud.
(True/False)
4.8/5
(36)
Encryption is a preventive control ensuring data confidentiality and privacy during transmission and for storage.
(True/False)
4.8/5
(40)
Virus is a self-replicating,self-propagating,self-contained program that uses networking mechanisms to spread itself.
(True/False)
4.8/5
(42)
Encryption and hashing are similar process to maintain data confidentiality.
(True/False)
4.8/5
(40)
An information technology director collected the names and locations of key vendors,current hardware configuration,names of team members,and an alternative processing location.What is the director most likely preparing?
(Multiple Choice)
4.9/5
(35)
Information security is a critical factor in maintaining systems integrity.
(True/False)
4.8/5
(26)
Which of the following passwords would be most difficult to crack?
(Multiple Choice)
4.9/5
(38)
Bacchus,Inc.is a larger multinational corporation with various business units around the world.After a fire destroyed the corporation headquarters and largest manufacturing site,plans for which of the following would help Bacchus ensure a timely recovery?
(Multiple Choice)
4.7/5
(41)
Certificate Authority (CA)issues digital certificates to bond the subscriber with a public key and a private key.
(True/False)
4.8/5
(40)
Describe the framework for vulnerability assessment and vulnerability management.
(Essay)
4.9/5
(41)
Disaster recovery planning and business continuity management are preventive controls.
(True/False)
4.7/5
(43)
Which of the following statements regarding authentication in conducting e-business is incorrect?
(Multiple Choice)
4.8/5
(41)
One type of fault tolerance is using redundant units to provide a system the ability to continue functioning when part of the system fails.
(True/False)
4.8/5
(35)
When computer programs or files can be accessed from terminals,users should be required to enter a(n)
(Multiple Choice)
4.7/5
(32)
Which of the following security controls would best prevent unauthorized access to a firm's internal network?
(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 47
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)