Exam 8: Controls for Information Security
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
A separate network located outside the organization's internal information system that permits controlled access from the Internet to selected resources is known as a(n)
(Multiple Choice)
4.9/5
(36)
Which of the following is not one of the three fundamental information security concepts?
(Multiple Choice)
4.8/5
(36)
Describe the three types of detective controls that enable organizations timely detection of intrusions and problems.
(Essay)
4.9/5
(37)
Which of the following is commonly true of the default settings for most commercially available wireless access points?
(Multiple Choice)
4.8/5
(46)
Describe the five principles of the Trust Services Framework.Select one of the principles and discuss the why it is important to an organization.
(Essay)
4.9/5
(37)
The ________ disseminates information about fraud,errors,breaches and other improper system uses and their consequences.
(Multiple Choice)
4.8/5
(35)
In the time-based model of information security,R represents
(Multiple Choice)
4.8/5
(42)
Timely detection of problems is not enough to protect organizations' information resources.
(True/False)
4.8/5
(41)
Which of the following preventive controls are necessary to provide adequate security for social engineering threats?
(Multiple Choice)
4.7/5
(38)
Describe the concept of Internet of Things (IoT)and its security implications.
(Essay)
4.8/5
(39)
Identify a party below who was involved with developing the Trust Services Framework.
(Multiple Choice)
4.9/5
(45)
The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as
(Multiple Choice)
4.7/5
(40)
Why does COBIT5 DSS-05.06 stress the importance of restricting physical access to network printers?
(Multiple Choice)
4.9/5
(37)
New employees of Baker Technologies are assigned user names and appropriate permissions.Their credentials are then entered into the company's information system's access control matrix.This is an example of a(n)
(Multiple Choice)
4.8/5
(41)
Which of the following is an example of a corrective control?
(Multiple Choice)
4.9/5
(37)
In the time-based model of information security,P represents
(Multiple Choice)
4.9/5
(37)
Compatibility tests utilize a(n)________,which is a list of authorized users,programs,and data files the users are authorized to access or manipulate.
(Multiple Choice)
4.8/5
(37)
Restricting access of users to specific portions of the system as well as specific tasks,is an example of
(Multiple Choice)
4.8/5
(37)
Showing 41 - 60 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)