Exam 10: Computer Crime and Information Technology Security
Exam 2: Role and Purpose of Accounting Information Systems75 Questions
Exam 3: Transaction Processing in the Ais75 Questions
Exam 4: Internal Controls75 Questions
Exam 5: Management Concepts74 Questions
Exam 6: Information Systems Concepts71 Questions
Exam 7: Flowcharting74 Questions
Exam 8: Data Flow Diagramming76 Questions
Exam 7: Rea Modeling75 Questions
Exam 8: XBRL74 Questions
Exam 9: E-Business and Enterprise Resource Planning Systems75 Questions
Exam 10: Computer Crime and Information Technology Security72 Questions
Exam 11: Salescollection Process73 Questions
Exam 12: Acquisitionpayment Process74 Questions
Exam 13: Other Business Processes75 Questions
Exam 14: Decision-Making Models and Knowledge Management73 Questions
Exam 17: Professionalism, Ethics, and Career Planning74 Questions
Exam 18: Auditing and Evaluating the Ais74 Questions
Select questions type
COBIT's enablers include culture, ethics and behavior.Establishing an organizational culture that values honesty is least likely to prevent which of the following risks to information systems?
Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
A
George received an e-mail that threatened to release his personal financial data unless he paid a fee.Which category of computer crime best describes that situation?
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
D
According to COBIT 5, an organization's information technology governance and management should enable a holistic approach.Which of the following frameworks provides the most holistic view of an organization?
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
C
Consider the following examples of computer crime as you answer the question:
i.Social Security numbers are stolen from a company's database.ii.A fraudster uses a computer to identify people over the age of 80 with annual incomes of $250,000 or more.iii.A supervisor receives threats from a worker via e-mail; the worker demands promotion as a condition of not exposing the supervisor's illegal acts.iv.An unhappy customer launches a denial-of-service attack.Which of the following pairs an item from the list with an appropriate description of a business risk?
(Multiple Choice)
4.9/5
(39)
Consider the following examples of computer crime as you answer the question:
i.Social Security numbers are stolen from a company's database.ii.A fraudster uses a computer to identify people over the age of 80 with annual incomes of $250,000 or more.iii.An employee receives threats from a co-worker via e-mail.iv.An unhappy customer launches a denial-of-service attack.Carter's taxonomy of computer crime comprises four categories.Which of the following statements is most true?
(Multiple Choice)
4.8/5
(34)
COBIT's enablers include culture, ethics and behavior.Which element of the COSO internal control framework is most closely related to that enabler?
(Multiple Choice)
4.7/5
(38)
Consider the following examples of computer crime as you answer the question:
i.Social Security numbers are stolen from a company's database.ii.A fraudster uses a computer to identify people over the age of 80 with annual incomes of $250,000 or more.iii.An employee receives threats from a co-worker via e-mail.iv.An unhappy customer launches a denial-of-service attack.Carter's taxonomy of computer crime comprises four categories.Which of the following pairs includes items from different categories?
(Multiple Choice)
4.9/5
(40)
George received an e-mail that threatened to release his personal financial data unless he paid a fee.That situation is an example of:
(Multiple Choice)
4.7/5
(34)
Consider the following short case as you respond to the question: Melissa is an internal auditor for the County of Bufflufia.Her job responsibilities include providing training on information systems security and checking the work of data entry clerks.Melissa is also part of a team that responds to denial-of-service attacks on the county's information system.Her co-worker, Eugene, ensures that all the county's computers have the most up-to-date antivirus software; he also enforces the county's policy of backing up sensitive data, such as employee social security numbers and other payroll information, at least once a day.The back-ups are dated and stored in a locked filing cabinet.Which employee has responsibilities related to technical security controls?
(Multiple Choice)
4.9/5
(33)
According to COBIT's principles, information technology governance and management should enable a ___ approach.
(Multiple Choice)
4.8/5
(44)
Consider the following short case as you respond to the question: Melissa is an internal auditor for the County of Bufflufia.Her job responsibilities include providing training on information systems security and checking the work of data entry clerks.Melissa is also part of a team that responds to denial-of-service attacks on the county's information system.Her co-worker, Eugene, ensures that all the county's computers have the most up-to-date antivirus software; he also enforces the county's policy of backing up sensitive data, such as employee social security numbers and other payroll information, at least once a day.The back-ups are dated and stored in a locked filing cabinet.Melissa's responsibilities relate to which elements of the CIA triad?
(Multiple Choice)
4.9/5
(32)
Which category of computer crime in Carter's taxonomy recognizes that the presence of computers has generated new versions of traditional crimes?
(Multiple Choice)
4.9/5
(42)
COBIT's enablers include "information." According to ISACA, information is very often the key product of the enterprise itself.Which of the following best exemplifies ISACA's explanation?
(Multiple Choice)
4.9/5
(42)
According to COBIT 5, an organization's information technology governance and management should meet stakeholder needs.Which of the following best pairs a stakeholder with an information need?
(Multiple Choice)
4.9/5
(30)
Consider the following short case as you respond to the question: Melissa is an internal auditor for the County of Bufflufia.Her job responsibilities include providing training on information systems security and checking the work of data entry clerks.Melissa is also part of a team that responds to denial-of-service attacks on the county's information system.Her co-worker, Eugene, ensures that all the county's computers have the most up-to-date antivirus software; he also enforces the county's policy of backing up sensitive data, such as employee social security numbers and other payroll information, at least once a day.The back-ups are dated and stored in a locked filing cabinet.Which of the following statements is most true?
(Multiple Choice)
4.9/5
(41)
Which element of Carter's taxonomy of computer crime is associated with each item below?
a.Computer is not required for the crime but is related to the criminal act
b.Computer is used to commit the crime
c.Computer use may make a crime more difficult to trace
d.Growth of the Internet creates new ways of reaching victims
e.Objective is to impact the confidentiality, availability and/or integrity of data
f.Presence of computers has generated new versions of fairly traditional crimes
g.Targets the system or its data
h.Technological growth creates new crime targets
i.Use of the computer simplifies criminal actions
j.Uses the computer to further a criminal end
(Essay)
4.8/5
(38)
Following the principles and enablers of COBIT will enable organizations to better:
(Multiple Choice)
4.9/5
(34)
The chapter discussed eleven examples of risks and threats to information systems and seven enablers from the COBIT framework.Consider the items below, each of which pairs risk with an enabler; explain how the two are related.The first item is done as an example.
a.Fraud/Processes.Every organization should have a process in place for reporting suspected fraud.
b.Information theft/Information.
c.Malicious software/Services, infrastructure and applications.
d.Disclosure of confidential information/Culture, ethics and behavior.
e.Service interruptions and delays/Organizational structures.
f.Fraud/People, skills and competencies.
(Essay)
4.9/5
(41)
The terms target, instrumentality, incidental and associated from Carter's taxonomy are most closely associated with which form of risk from Brown's taxonomy?
(Multiple Choice)
4.7/5
(35)
COBIT's principles include the need to separate governance from management.Based on Carter's taxonomy, which types of computer crime are most likely to occur if governance and management are not separated?
(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 72
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)