Exam 8: Controls for Information Security
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
Residents in Berryhill received an e-mail stating that there is an armed robber on the loose.The e-mail claimed to be from the Berryhill police department,but it wasn't.Computer forensic experts later determined that the e-mail was sent from a computer lab in the Berryhill's public library.The police were then able to uniquely identify the computer that was used by means of its network interface card's ________ address.Security cameras later help the police to reveal the identity of the individual responsible for the hoax.
(Multiple Choice)
4.8/5
(32)
The process of turning off unnecessary features in the system is known as
(Multiple Choice)
4.8/5
(32)
It was 8:03 A.M.when Jiao Jan,the Network Administrator for South Asian Technologies,was informed that the intrusion detection system had identified an ongoing attempt to breach network security.By the time that Jiao had identified and blocked the attack,the hacker had accessed and downloaded several files from the company's server.Using the notation for the time-based model of security,in this case
(Multiple Choice)
4.7/5
(45)
The Trust Services Framework reliability principle that states access to the system and its data should be accessible to meet operational and contractual obligations to legitimate users is known as
(Multiple Choice)
4.9/5
(38)
The Trust Services Framework reliability principle that states personal information should be protected from unauthorized disclosure is known as
(Multiple Choice)
4.7/5
(44)
The Trust Services Framework reliability principle that states access to the system and its data should be controlled and restricted to legitimate users is known as
(Multiple Choice)
4.7/5
(33)
Describe the function of a computer incident response team (CIRT)and the steps that a CIRT should perform following a security incident.
(Essay)
4.9/5
(36)
In the time-based model of information security,D represents
(Multiple Choice)
4.9/5
(45)
The steps that criminals take to trick an unsuspecting employee into granting them access is called
(Multiple Choice)
4.9/5
(30)
Information technology managers are often in a bind when a new exploit is discovered in the wild.They can respond by updating the affected software or hardware with new code provided by the manufacturer,which runs the risk that a flaw in the update will break the system.Or they can wait until the new code has been extensively tested,but that runs the risk that they will be compromised by the exploit during the testing period.Dealing with these issues is referred to as
(Multiple Choice)
4.8/5
(40)
This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination.
(Multiple Choice)
4.8/5
(33)
The process of maintaining a table listing all established connections between the organization's computers and the internet to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer is known as
(Multiple Choice)
4.9/5
(32)
Describe the basic steps criminal use to attack an organization's information system.Select one of the steps and find a news story that relates to the step that you have chosen.
(Essay)
4.8/5
(30)
Logs need to be analyzed regularly to detect problems in a timely manner.
(True/False)
4.7/5
(34)
Tools called ________ can be used to identify unused and,therefore,unnecessary programs that represent potential security threats.
(Multiple Choice)
4.8/5
(31)
If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack,then security is
(Multiple Choice)
4.7/5
(33)
________ is an authorized attempt by an internal audit team or an external security consultant to attempt to break into the organization's information system.
(Multiple Choice)
4.9/5
(37)
Showing 21 - 40 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)