Exam 8: Controls for Information Security
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
Cloud computing can potentially generate significant cost savings for an organization.
(True/False)
4.7/5
(40)
A special purpose hardware device or software running on a general purpose computer,which filters information that is allowed to enter and leave the organization's information system,is known as a(n)
(Multiple Choice)
4.9/5
(42)
The steps that criminals take to identify potential points of remote entry is called
(Multiple Choice)
4.7/5
(42)
Which of the following is an example of a detective control?
(Multiple Choice)
4.7/5
(36)
New employees of Baker Technologies are assigned user names and appropriate permissions.Each of them were given a company's issued laptop that have an integrated fingerprint reader.In order to log in,the user's fingerprint must be recognized by the reader.This is an example of a(n)
(Multiple Choice)
4.9/5
(43)
All employees of E.C.Hoxy are required to pass through a gate and present their photo identification cards to the guard before they are admitted.Entry to secure areas,such as the Information Technology Department offices,requires further procedures.This is an example of a(n)
(Multiple Choice)
4.9/5
(36)
Which of the following is not a requirement of effective passwords?
(Multiple Choice)
4.8/5
(41)
Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security?
(Multiple Choice)
4.8/5
(34)
The most effective way to protect network resources that are exposed to the internet,yet reside outside of a network is
(Multiple Choice)
4.8/5
(39)
Identify the statement below which is not a useful control procedure regarding access to system outputs.
(Multiple Choice)
4.7/5
(34)
A major financial institution hired a renowned security firm to attempt to compromise its computer network.A few days later,the security firm reported that it had successfully entered the financial institution's computer system without being detected.The security firm presented an analysis of the vulnerabilities that had been found to the financial institution.This is an example of a
(Multiple Choice)
4.8/5
(32)
Cloud computing is generally more secure than traditional computing.
(True/False)
4.7/5
(36)
The steps that criminals take to find known vulnerabilities and learn how to take advantage of those vulnerabilities is called
(Multiple Choice)
4.9/5
(34)
In recent years,many of the attacks carried out by hackers have relied on this type of vulnerability in computer software.
(Multiple Choice)
4.9/5
(37)
Showing 61 - 80 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)