Exam 8: Information Systems Controls for System Reliability Part 1: Information Security
Exam 1: Accounting Information Systems: an Overview79 Questions
Exam 2: Overview of Transaction Processing and Erp Systems74 Questions
Exam 3: Systems Documentation Techniques83 Questions
Exam 4: Relational Databases80 Questions
Exam 5: Computer Fraud46 Questions
Exam 6: Computer Fraud and Abuse Techniques45 Questions
Exam 7: Control and Accounting Information Systems96 Questions
Exam 8: Information Systems Controls for System Reliability Part 1: Information Security53 Questions
Exam 9: Information Systems Controls for Systems Reliability Part 2: Confidentiality and Privacy24 Questions
Exam 10: Information Systems Controls for Systems Reliability Part 3: Processing Integrity and Availability63 Questions
Exam 11: Auditing Computer-Based Information Systems72 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections81 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements83 Questions
Exam 14: The Production Cycle68 Questions
Exam 15: The Human Resources Management and Payroll Cycle58 Questions
Exam 16: General Ledger and Reporting System57 Questions
Exam 17: The Rea Data Model61 Questions
Exam 18: Implementing an Rea Model in a Relational Database68 Questions
Exam 19: Special Topics in Rea Modeling72 Questions
Exam 20: Introduction to Systems Development Systems Analysis90 Questions
Exam 21: Ais Development Strategies73 Questions
Exam 22: Systems Design, implementation, and Operation70 Questions
Select questions type
The ________ disseminates information about fraud,errors,breaches and other improper system uses and their consequences.
(Multiple Choice)
4.9/5
(39)
Murray Snitzel called a meeting of the top management at Snitzel Capital Management.Number one on the agenda was computer system security."The risk of security breach incidents has become unacceptable," he said,and turned to the Chief Information Officer."This is your responsibility! What do you intend to do?" Which of the following is the best answer?
(Multiple Choice)
4.8/5
(46)
The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as
(Multiple Choice)
4.8/5
(34)
In 2007,a major U.S.financial institution hired a security firm to attempt to compromise its computer network.A week later,the firm reported that it had successfully entered the system without apparent detection and presented an analysis of the vulnerabilities that had been found.This is an example of a
(Multiple Choice)
4.7/5
(40)
Which of the following is not one of the three fundamental information security concepts?
(Multiple Choice)
4.9/5
(37)
This network access control determines which IP packets are allowed entry to a network and which are dropped.
(Multiple Choice)
4.8/5
(28)
The security technology that evaluates IP packet traffic patterns in order to identify attacks against a system is known as
(Multiple Choice)
4.9/5
(29)
This is an authorized attempt by an internal audit team or an external security consultant to attempt to break into the organization's information system.
(Multiple Choice)
4.9/5
(36)
Information technology managers are often in a bind when a new exploit is discovered in the wild.They can respond by updating the affected software or hardware with new code provided by the manufacturer,which runs the risk that a flaw in the update will break the system.Or they can wait until the new code has been extensively tested,but that runs the risk that they will be compromised by the exploit during the testing period.Dealing with these issues is referred to as
(Multiple Choice)
4.8/5
(35)
Identify three ways users can be authenticated and give an example of each.
(Essay)
4.7/5
(38)
Which of the following is an example of a detective control?
(Multiple Choice)
4.7/5
(33)
Verifying the identity of the person or device attempting to access the system is
(Multiple Choice)
4.8/5
(33)
When new employees are hired by Folding Squid Technologies,they are assigned user names and passwords and provided with laptop computers that have an integrated fingerprint reader.In order to log in,the user's fingerprint must be recognized by the reader.This is an example of a(an)
(Multiple Choice)
4.7/5
(32)
According to the Trust Services Framework,the reliability principle of integrity is achieved when the system produces data that
(Multiple Choice)
4.9/5
(38)
Which of the following is an example of a corrective control?
(Multiple Choice)
5.0/5
(35)
There are "white hat" hackers and "black hat" hackers.Cowboy451 was one of the "black hat" hackers.He had researched an exploit and determined that he could penetrate the target system,download a file containing valuable data,and cover his tracks in eight minutes.Six minutes into the attack he was locked out of the system.Using the notation of the time-based model of security,which of the following must be true?
(Multiple Choice)
4.8/5
(44)
This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.
(Multiple Choice)
4.9/5
(36)
The process that allows a firewall to be more effective by examining the data in the body of an IP packet,instead of just the header,is known as
(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 53
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)