Exam 8: Controls for Information Security
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
C
Describe what a man-trap is and how it contributes to information security.
Free
(Essay)
4.8/5
(42)
Correct Answer:
A man-trap is a specially designed room to trap unauthorized individuals.Typically,a man-trap room contains two doors.Entry to the first door requires the person insert and ID card and enter a password.Successful authentication opens the first door,permitting the individual into the room.Once inside the room,the door closes and locks behind the individual.Then,the individual must successfully pass a second set of authentication controls that typically includes a biometric credential.Failure to pass results in the individual being trapped in the room.
A special purpose hardware device or software running on a general purpose computer,which filters information that is allowed to enter and leave the organization's information system,is known as a(n)
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
D
Which of the following is not one of the three fundamental information security concepts?
(Multiple Choice)
4.9/5
(33)
There are "white hat" hackers and "black hat" hackers.Cowboy451 was one of the "black hat" hackers.He had researched an exploit and determined that he could penetrate the target system,download a file containing valuable data,and cover his tracks in eight minutes.Six minutes into the attack he was locked out of the system.Using the notation of the time-based model of security,which of the following must be true?
(Multiple Choice)
4.8/5
(39)
It was 8:03 A.M.when Jiao Jan,the Network Administrator for South Asian Technologies,was informed that the intrusion detection system had identified an ongoing attempt to breach network security.By the time that Jiao had identified and blocked the attack,the hacker had accessed and downloaded several files from the company's server.Using the notation for the time-based model of security,in this case
(Multiple Choice)
4.9/5
(39)
The Trust Services Framework reliability principle that states access to the system and its data should be controlled and restricted to legitimate users is known as
(Multiple Choice)
4.9/5
(47)
COBIT 5 management practice APO01.08 stresses the importance of ________ of both employee compliance with the organization's information security policies and overall performance of business processes.
(Multiple Choice)
4.8/5
(36)
The process of turning off unnecessary features in the system is known as
(Multiple Choice)
5.0/5
(31)
The Trust Services Framework reliability principle that states access to the system and its data should be accessible to meet operational and contractual obligations to legitimate users is known as
(Multiple Choice)
4.8/5
(29)
The most effective method for protecting an organization from social engineering attacks is providing
(Multiple Choice)
4.8/5
(42)
Identify the statement below which is not a useful control procedure regarding access to system outputs.
(Multiple Choice)
4.8/5
(38)
Verifying the identity of the person or device attempting to access the system is an example of
(Multiple Choice)
4.7/5
(33)
Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security?
(Multiple Choice)
4.9/5
(40)
This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.
(Multiple Choice)
4.8/5
(37)
This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination.
(Multiple Choice)
4.8/5
(42)
Which of the following is not a requirement of effective passwords?
(Multiple Choice)
5.0/5
(39)
Showing 1 - 20 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)