Exam 8: Controls for Information Security
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
This is an authorized attempt by an internal audit team or an external security consultant to attempt to break into the organization's information system.
(Multiple Choice)
4.9/5
(33)
True or False: Cloud computing can potentially generate significant cost savings for an organization.
(True/False)
4.8/5
(40)
When new employees are hired by Pacific Technologies,they are assigned user names and appropriate permissions are entered into the information system's access control matrix.This is an example of a(n)
(Multiple Choice)
4.9/5
(35)
The Trust Services Framework reliability principle that states access to the system and its data should be controlled and restricted to legitimate users is known as
(Multiple Choice)
4.7/5
(48)
This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.
(Multiple Choice)
4.9/5
(35)
Describe what information security process the term hardening refers to.
(Essay)
4.7/5
(35)
The process that allows a firewall to be more effective by examining the data in the body of an IP packet,instead of just the header,is known as
(Multiple Choice)
4.8/5
(37)
The process of turning off unnecessary features in the system is known as
(Multiple Choice)
4.9/5
(46)
Which of the following is not one of the three fundamental information security concepts?
(Multiple Choice)
4.9/5
(36)
True or False: Cloud computing is generally more secure than traditional computing.
(True/False)
4.9/5
(39)
Identify the primary means of protecting data stored in a cloud from unauthorized access.
(Multiple Choice)
4.9/5
(40)
The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as
(Multiple Choice)
4.7/5
(44)
This network access control determines which IP packets are allowed entry to a network and which are dropped.
(Multiple Choice)
4.9/5
(36)
There are "white hat" hackers and "black hat" hackers.Cowboy451 was one of the "black hat" hackers.He had researched an exploit and determined that he could penetrate the target system,download a file containing valuable data,and cover his tracks in eight minutes.Six minutes into the attack he was locked out of the system.Using the notation of the time-based model of security,which of the following must be true?
(Multiple Choice)
4.8/5
(37)
The Trust Services Framework reliability principle that states that users must be able to enter,update,and retrieve data during agreed-upon times is known as
(Multiple Choice)
4.7/5
(43)
Verifying the identity of the person or device attempting to access the system is an example of
(Multiple Choice)
4.9/5
(46)
In recent years,many of the attacks carried out by hackers have relied on this type of vulnerability in computer software.
(Multiple Choice)
4.8/5
(38)
Restricting access of users to specific portions of the system as well as specific tasks,is an example of
(Multiple Choice)
4.9/5
(47)
Showing 41 - 60 of 69
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)