Exam 8: Controls for Information Security
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
The security technology that evaluates IP packet traffic patterns in order to identify attacks against a system is known as
(Multiple Choice)
4.8/5
(44)
The process of maintaining a table listing all established connections between the organization's computers and the internet to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer is known as
(Multiple Choice)
4.8/5
(41)
Information security procedures protect information integrity by
(Multiple Choice)
4.8/5
(38)
The most effective method for protecting an organization from social engineering attacks is providing
(Multiple Choice)
4.7/5
(36)
If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack,then security is
(Multiple Choice)
4.9/5
(40)
On April 1,2012,students enrolled in an economics course at Harvard University received an e-mail stating that class would be cancelled.The e-mail claimed to be from the professor,but it wasn't.Computer forensic experts determined that the e-mail was sent from a computer in one of the campus labs at 6:32 A.M.They were then able to uniquely identify the computer that was used by means of its network interface card's ________ address.Security cameras revealed the identity of the student responsible for spoofing the class.
(Multiple Choice)
4.9/5
(36)
Describe the function of a computer incident response team (CIRT)and the steps that a CIRT should perform following a security incident.
(Essay)
4.8/5
(41)
Describe what a man-trap is and how it contributes to information security.
(Essay)
4.7/5
(40)
When new employees are hired by Pacific Technologies,they are assigned user names and passwords and provided with laptop computers that have an integrated fingerprint reader.In order to log in,the user's fingerprint must be recognized by the reader.This is an example of a(n)
(Multiple Choice)
4.9/5
(31)
In 2007,a major U.S.financial institution hired a security firm to attempt to compromise its computer network.A week later,the firm reported that it had successfully entered the system without apparent detection and presented an analysis of the vulnerabilities that had been found.This is an example of a
(Multiple Choice)
4.8/5
(37)
Identify one aspect of systems reliability that is not a source of concern with regards to a public cloud.
(Multiple Choice)
4.9/5
(32)
This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination.
(Multiple Choice)
4.9/5
(39)
Identify three ways users can be authenticated and give an example of each.
(Essay)
4.9/5
(32)
Identify the statement below which is not a useful control procedure regarding access to system outputs.
(Multiple Choice)
4.9/5
(31)
According to the Trust Services Framework,the reliability principle of integrity is achieved when the system produces data that
(Multiple Choice)
4.8/5
(37)
Which of the following is an example of a corrective control?
(Multiple Choice)
4.8/5
(46)
Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security?
(Multiple Choice)
4.8/5
(44)
Showing 21 - 40 of 69
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)