Exam 8: Controls for Information Security
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
The process that uses automated tools to identify whether a system possesses any well-known security problems is known as a(n)
Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
D
________ is/are an example of a detective control.
Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
D
This is used to identify rogue modems (or by hackers to identify targets).
Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
B
Compatibility tests utilize a(n)________,which is a list of authorized users,programs,and data files the users are authorized to access or manipulate.
(Multiple Choice)
4.8/5
(47)
Kuzman Jovan called a meeting of the top management at Jovan Capital Management.Number one on the agenda was computer system security."The risk of security breach incidents has become unacceptable," he said,and turned to the Chief Information Officer."What do you intend to do?" Which of the following is the best answer?
(Multiple Choice)
4.7/5
(53)
Which of the following is not one of the essential criteria for successfully implementing each of the principles that contribute to systems reliability,as discussed in the Trust Services Framework?
(Multiple Choice)
4.8/5
(35)
All employees of E.C.Hoxy are required to pass through a gate and present their photo identification cards to the guard before they are admitted.Entry to secure areas,such as the Information Technology Department offices,requires further procedures.This is an example of a(n)
(Multiple Choice)
4.8/5
(40)
It was 8:03 A.M.when Jiao Jan,the Network Administrator for South Asian Technologies,was informed that the intrusion detection system had identified an ongoing attempt to breach network security.By the time that Jiao had identified and blocked the attack,the hacker had accessed and downloaded several files from the company's server.Using the notation for the time-based model of security,in this case
(Multiple Choice)
4.8/5
(30)
The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as
(Multiple Choice)
4.8/5
(42)
Noseybook is a social networking site that boasts over a million registered users and a quarterly membership growth rate in the double digits.As a consequence,the size of the information technology department has been growing very rapidly,with many new hires.Each employee is provided with a name badge with a photo and embedded computer chip that is used to gain entry to the facility.This is an example of a(n)
(Multiple Choice)
4.7/5
(36)
Which of the below keeps a record of the network traffic permitted to pass through a firewall?
(Multiple Choice)
4.8/5
(39)
A well-known hacker started his own computer security consulting business shortly after being released from prison.Many companies pay him to attempt to gain unauthorized access to their network.If he is successful,he offers advice as to how to design and implement better controls.What is the name of the testing for which the hacker is being paid?
(Multiple Choice)
4.8/5
(45)
The Trust Services Framework reliability principle that states personal information should be protected from unauthorized disclosure is known as
(Multiple Choice)
4.8/5
(35)
Identify a party below who was involved with developing the Trust Services Framework.
(Multiple Choice)
4.8/5
(39)
Identify the best description of an access control matrix below.
(Multiple Choice)
4.9/5
(39)
Which of the following is commonly true of the default settings for most commercially available wireless access points?
(Multiple Choice)
4.7/5
(33)
The most effective way to protect network resources that are exposed to the internet,yet reside outside of a network is
(Multiple Choice)
4.7/5
(46)
Showing 1 - 20 of 69
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)