Exam 8: Information Systems Controls for System Reliability Part 1: Information Security
Exam 1: Accounting Information Systems: an Overview79 Questions
Exam 2: Overview of Transaction Processing and Erp Systems74 Questions
Exam 3: Systems Documentation Techniques83 Questions
Exam 4: Relational Databases80 Questions
Exam 5: Computer Fraud46 Questions
Exam 6: Computer Fraud and Abuse Techniques45 Questions
Exam 7: Control and Accounting Information Systems96 Questions
Exam 8: Information Systems Controls for System Reliability Part 1: Information Security53 Questions
Exam 9: Information Systems Controls for Systems Reliability Part 2: Confidentiality and Privacy24 Questions
Exam 10: Information Systems Controls for Systems Reliability Part 3: Processing Integrity and Availability63 Questions
Exam 11: Auditing Computer-Based Information Systems72 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections81 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements83 Questions
Exam 14: The Production Cycle68 Questions
Exam 15: The Human Resources Management and Payroll Cycle58 Questions
Exam 16: General Ledger and Reporting System57 Questions
Exam 17: The Rea Data Model61 Questions
Exam 18: Implementing an Rea Model in a Relational Database68 Questions
Exam 19: Special Topics in Rea Modeling72 Questions
Exam 20: Introduction to Systems Development Systems Analysis90 Questions
Exam 21: Ais Development Strategies73 Questions
Exam 22: Systems Design, implementation, and Operation70 Questions
Select questions type
The process that maintains a table that lists all established connections between the organization's computers and the Internet,to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer is known as
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
C
Which of the following is the most effective method of protecting against social engineering attacks on a computer system?
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
B
In recent years,many of the attacks carried out by hackers have relied on this type of vulnerability in computer software.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
D
Which of the following is an example of a preventive control?
(Multiple Choice)
4.7/5
(36)
Which of the following is commonly true of the default settings for most commercially available wireless access points?
(Multiple Choice)
4.9/5
(33)
Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security?
(Multiple Choice)
4.8/5
(46)
The most effective way to protect network resources,like email servers,that are outside of the network and are exposed to the Internet is
(Multiple Choice)
4.9/5
(32)
This creates logs of network traffic that was permitted to pass the firewall.
(Multiple Choice)
4.8/5
(40)
Describe the function of a computer incident response team (CIRT)and the steps that a CIRT should perform following a security incident.
(Essay)
4.8/5
(28)
All employees of E.C.Hoxy are required to pass through a gate and present their photo identification cards to the guard before they are admitted.Entry to secure areas,such as the Information Technology Department offices,requires further procedures.This is an example of a(an)
(Multiple Choice)
4.8/5
(34)
Restricting access of users to specific portions of the system as well as specific tasks,is
(Multiple Choice)
4.9/5
(33)
A special purpose hardware device or software running on a general purpose computer,which filters information that is allowed to enter and leave the organization's information system,is known as a(n)
(Multiple Choice)
4.8/5
(39)
The Trust Services Framework reliability principle that states that users must be able to enter,update,and retrieve data during agreed-upon times is known as
(Multiple Choice)
4.8/5
(37)
When new employees are hired by Folding Squid Technologies,they are assigned user names and appropriate permissions are entered into the information system's access control matrix.This is an example of a(an)
(Multiple Choice)
4.8/5
(37)
The process that uses automated tools to identify whether a system possesses any well-known security problems is known as a(n)
(Multiple Choice)
4.8/5
(24)
Which of the following is not a requirement of effective passwords?
(Multiple Choice)
4.9/5
(32)
A well-known hacker started his own computer security consulting business shortly after being released from prison.Many companies pay him to attempt to gain unauthorized access to their network.If he is successful,he offers advice as to how to design and implement better controls.What is the name of the testing for which the hacker is being paid?
(Multiple Choice)
4.7/5
(40)
Showing 1 - 20 of 53
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)