Exam 10: Computer Crime and Information Technology Security
Exam 2: Role and Purpose of Accounting Information Systems75 Questions
Exam 3: Transaction Processing in the Ais75 Questions
Exam 4: Internal Controls75 Questions
Exam 5: Management Concepts74 Questions
Exam 6: Information Systems Concepts71 Questions
Exam 7: Flowcharting74 Questions
Exam 8: Data Flow Diagramming76 Questions
Exam 7: Rea Modeling75 Questions
Exam 8: XBRL74 Questions
Exam 9: E-Business and Enterprise Resource Planning Systems75 Questions
Exam 10: Computer Crime and Information Technology Security72 Questions
Exam 11: Salescollection Process73 Questions
Exam 12: Acquisitionpayment Process74 Questions
Exam 13: Other Business Processes75 Questions
Exam 14: Decision-Making Models and Knowledge Management73 Questions
Exam 17: Professionalism, Ethics, and Career Planning74 Questions
Exam 18: Auditing and Evaluating the Ais74 Questions
Select questions type
According to ISACA, one of COBIT's enablers is required for keeping the organization running and well governed; that enabler is often the key product of the enterprise itself.It is therefore most closely related to which generic element of the accounting information system?
(Multiple Choice)
4.8/5
(38)
A private university maintains sensitive information about its donors in both a paper file and an electronic database.Using the three-part control taxonomy discussed in the chapter, identify and describe two controls in each category that should be implemented to prevent/detect/correct the risk that such information might be compromised.
(Essay)
4.7/5
(40)
The chapter discussed the four elements of Carter's taxonomy of computer crime and eleven business risks/threats to information systems.Classify each item below using each of them.
(Essay)
5.0/5
(39)
According to ISACA, which COBIT enabler provides the vehicle for translating desired behavior into practical guidance for day-to-day management?
(Multiple Choice)
4.7/5
(37)
For each IT control listed below, indicate the group which most clearly applies: (a) physical security control, (b) technical security control or (c) administrative security control.1.Audible alarm when a computer detects a virus-infected e-mail attachment
2.Conflict of interest policy
3.Different passwords for each ERP module
4.Filing cabinets requiring keys
5.Fire suppression systems
6.Keystroke monitoring software
7.Locking compartments in desks
8.Log-ins requiring fingerprint identification
9.Mandatory password rotation
10.Periodic internal audits
(Essay)
4.8/5
(44)
According to COBIT 5, an organization's information technology governance and management should separate governance from management.In that context, examples of management include:
(Multiple Choice)
5.0/5
(49)
Consider the following examples of computer crime as you answer the question:
i.Social Security numbers are stolen from a company's database.ii.A fraudster uses a computer to identify people over the age of 80 with annual incomes of $250,000 or more.iii.A supervisor receives threats from a worker via e-mail; the worker demands promotion as a condition of not exposing the supervisor's illegal acts.iv.An unhappy customer launches a denial-of-service attack.Which two items represent the same category of risk from the list discussed in the chapter?
(Multiple Choice)
4.9/5
(31)
Fill in the blanks below according to the principles and enablers of the COBIT framework.
a.___, policies and frameworks.
b.Applying a ___.
c.Covering the enterprise ___.
d.Culture, ___ and behavior.
e.Enabling a ___ approach.
f.Meeting ___ needs.
g.Organizational ___.
h.People, ___ and ___.
i.Separating ___ from ___.
j.Services, infrastructure and ___.
(Essay)
4.8/5
(40)
The COBIT framework comprises five principles and seven enablers.In your own words, explain the relationship between each principle and enabler paired below; the first one is done as an example.
a.Meeting stakeholder needs/People, skills and competencies.People inside and outside the organization are stakeholders.
b.Covering the enterprise end-to-end/Processes.
c.Applying a single integrated framework/Principles, policies and frameworks.
d.Enabling a holistic approach/Information.
e.Separating governance from management/Culture, ethics and behavior.
f.Meeting stakeholder needs/Processes.
(Essay)
4.8/5
(36)
According to COBIT's principles, information technology governance and management should meet ___ needs.
(Multiple Choice)
4.9/5
(28)
According to COBIT's principles, information technology governance and management should cover the enterprise:
(Multiple Choice)
4.8/5
(45)
Showing 61 - 72 of 72
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)