Exam 9: Information Systems Controls for Systems Reliability Part 2: Confidentiality and Privacy
Exam 1: Accounting Information Systems: an Overview79 Questions
Exam 2: Overview of Transaction Processing and Erp Systems74 Questions
Exam 3: Systems Documentation Techniques83 Questions
Exam 4: Relational Databases80 Questions
Exam 5: Computer Fraud46 Questions
Exam 6: Computer Fraud and Abuse Techniques45 Questions
Exam 7: Control and Accounting Information Systems96 Questions
Exam 8: Information Systems Controls for System Reliability Part 1: Information Security53 Questions
Exam 9: Information Systems Controls for Systems Reliability Part 2: Confidentiality and Privacy24 Questions
Exam 10: Information Systems Controls for Systems Reliability Part 3: Processing Integrity and Availability63 Questions
Exam 11: Auditing Computer-Based Information Systems72 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections81 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements83 Questions
Exam 14: The Production Cycle68 Questions
Exam 15: The Human Resources Management and Payroll Cycle58 Questions
Exam 16: General Ledger and Reporting System57 Questions
Exam 17: The Rea Data Model61 Questions
Exam 18: Implementing an Rea Model in a Relational Database68 Questions
Exam 19: Special Topics in Rea Modeling72 Questions
Exam 20: Introduction to Systems Development Systems Analysis90 Questions
Exam 21: Ais Development Strategies73 Questions
Exam 22: Systems Design, implementation, and Operation70 Questions
Select questions type
Which of the following is not associated with asymmetric encryption?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
D
Information encrypted with the creator's private key that is used to authenticate the sender is
Free
(Multiple Choice)
4.9/5
(47)
Correct Answer:
C
The system and processes used to issue and manage asymmetric keys and digital certificates are known as
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
D
On March 3,2008,a laptop computer belonging to Folding Squid Technology was stolen from the trunk of Jiao Jan's car while he was attending a conference in Cleveland,Ohio.After reporting the theft,Jiao considered the implications of the theft for the company's network security and concluded there was nothing to worry about because
(Multiple Choice)
5.0/5
(36)
Jeff Davis took a call from a client."Jeff,I need for my customers to make payments online using credit cards,but I want to make sure that the credit card data isn't intercepted.What do you suggest?" Jeff responded "The best solution will be to implement
(Multiple Choice)
4.8/5
(39)
A process that takes plaintext of any length and transforms it into a short code.
(Multiple Choice)
4.9/5
(31)
Jeff Davis took a call from a client."Jeff,I need to interact online and real time with our affiliate in India,and I want to make sure that our communications aren't intercepted.What do you suggest?" Jeff responded "The best solution will be to implement
(Multiple Choice)
4.9/5
(24)
Which of the following describes one weakness of encryption?
(Multiple Choice)
4.8/5
(33)
In developing policies related to personal information about customers,Folding Squid Technologies adhered to the Trust Services framework.The standard applicable to these policies is
(Multiple Choice)
4.9/5
(35)
Concerning virtual private networks (VPN),which of the following is not true?
(Multiple Choice)
4.9/5
(31)
Using a combination of symmetric and asymmetric key encryption,Chris Kai sent a report to her home office in Syracuse,New York.She received an email acknowledgement that the document had been received and then,a few minutes later,she received a second email that indicated that the hash calculated from the report differed from that sent with the report.This most likely explanation for this result is that
(Multiple Choice)
4.8/5
(38)
Describe some steps you can take to minimize your risk of identify theft.
(Essay)
4.8/5
(29)
Which of the following descriptions is not associated with symmetric encryption?
(Multiple Choice)
4.8/5
(34)
Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information?
(Multiple Choice)
4.7/5
(36)
Encryption has a remarkably long and varied history.Spies have been using it to convey secret messages ever since there were secret messages to convey.One powerful method of encryption uses random digits.Two documents are prepared with the same random sequence of numbers.The spy is sent out with one and the spy master retains the other.The digits are used as follows.Suppose that the word to be encrypted is SPY and the random digits are 352.Then S becomes V (three letters after S),P becomes U (five letters after P),and Y becomes A (two letters after Y,restarting at A after Z).The spy would encrypt a message and then destroy the document used to encrypt it.This is an early example of
(Multiple Choice)
4.9/5
(37)
An electronic document that certifies the identity of the owner of a particular public key.
(Multiple Choice)
5.0/5
(33)
One way to circumvent the counterfeiting of public keys is by using
(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 24
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)