Exam 8: Controls for Information Security
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
This network access control determines which IP packets are allowed entry to a network and which are dropped.
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
A
Which of the following is an example of a preventive control?
Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
A
Describe the steps in the security life cycle.
Free
(Essay)
4.8/5
(30)
Correct Answer:
There are four steps in the security life cycle.The first step in the security life cycle is to assess the information security-related threats that the organization faces and select an appropriate response.The second step involves developing information security policies and communicating them to all employees.The third step involves the acquisition or building of specific technological tools.The final step in the security life cycle entails regular monitoring of performance to evaluate the effectiveness of the organization's information security program.
According to the Trust Services Framework,the reliability principle of availability is achieved when the system produces data that
(Multiple Choice)
4.9/5
(36)
Who bears the responsibility for information security in an organization?
(Multiple Choice)
4.7/5
(39)
Describe the security risks associated with virtualization and cloud computing.
(Essay)
4.9/5
(40)
Identify one aspect of systems reliability that is not a source of concern with regards to a public cloud.
(Multiple Choice)
4.8/5
(40)
Describe what information security process the term hardening refers to.
(Essay)
4.8/5
(39)
Identify the primary means of protecting data stored in a cloud from unauthorized access.
(Multiple Choice)
4.8/5
(31)
ShareIt is a social networking site that boasts over a million registered users and a quarterly membership growth rate in the double digits.As a consequence,the size of the information technology department has been growing very rapidly,with many new hires.Each employee is provided with a name badge with a photo and embedded computer chip that is used to gain entry to the facility.This is an example of a(n)
(Multiple Choice)
4.8/5
(31)
The process that uses automated tools to identify whether a system possesses any well-known security problems is known as a(n)
(Multiple Choice)
5.0/5
(31)
COBIT 5 management practice APO01.08 stresses the importance of ________ of both employee compliance with the organization's information security policies and overall performance of business processes.
(Multiple Choice)
4.9/5
(30)
The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as
(Multiple Choice)
4.9/5
(49)
According to the Trust Services Framework,the confidentiality principle of integrity is achieved when the system produces data that
(Multiple Choice)
4.9/5
(30)
The process that allows a firewall to be more effective by examining the data in the body of an IP packet,instead of just the header,is known as
(Multiple Choice)
4.8/5
(37)
The Trust Services Framework reliability principle that states that users must be able to enter,update,and retrieve data during agreed-upon times is known as
(Multiple Choice)
4.9/5
(34)
The most effective method for protecting an organization from social engineering attacks is providing
(Multiple Choice)
4.7/5
(39)
Showing 1 - 20 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)