Exam 11: Information Security and Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the primary objective of data security controls?

(Multiple Choice)
5.0/5
(32)

Symmetric-key encryption method is used to authenticate users.

(True/False)
4.9/5
(40)

Fraud triangle includes incentive,opportunity and an attitude to rationalize the fraud.

(True/False)
4.8/5
(36)

Encryption is a preventive control ensuring data confidentiality and privacy during transmission and for storage.

(True/False)
4.8/5
(40)

Virus is a self-replicating,self-propagating,self-contained program that uses networking mechanisms to spread itself.

(True/False)
4.8/5
(42)

Encryption and hashing are similar process to maintain data confidentiality.

(True/False)
4.8/5
(40)

An information technology director collected the names and locations of key vendors,current hardware configuration,names of team members,and an alternative processing location.What is the director most likely preparing?

(Multiple Choice)
4.9/5
(35)

Information security is a critical factor in maintaining systems integrity.

(True/False)
4.8/5
(26)

Which of the following passwords would be most difficult to crack?

(Multiple Choice)
4.9/5
(38)

Bacchus,Inc.is a larger multinational corporation with various business units around the world.After a fire destroyed the corporation headquarters and largest manufacturing site,plans for which of the following would help Bacchus ensure a timely recovery?

(Multiple Choice)
4.7/5
(41)

Certificate Authority (CA)issues digital certificates to bond the subscriber with a public key and a private key.

(True/False)
4.8/5
(40)

Describe the framework for vulnerability assessment and vulnerability management.

(Essay)
4.9/5
(41)

Disaster recovery planning and business continuity management are preventive controls.

(True/False)
4.7/5
(43)

Which of the following statements regarding authentication in conducting e-business is incorrect?

(Multiple Choice)
4.8/5
(41)

Which of the following is a password security weakness?

(Multiple Choice)
4.8/5
(33)

One type of fault tolerance is using redundant units to provide a system the ability to continue functioning when part of the system fails.

(True/False)
4.8/5
(35)

When computer programs or files can be accessed from terminals,users should be required to enter a(n)

(Multiple Choice)
4.7/5
(32)

Select a correct statement regarding encryption methods?

(Multiple Choice)
4.9/5
(33)

Which of the following security controls would best prevent unauthorized access to a firm's internal network?

(Multiple Choice)
4.8/5
(36)

What are the two prerequisites for vulnerability management?

(Essay)
5.0/5
(44)
Showing 21 - 40 of 47
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)