Exam 7: Infromation System Controls for Systems Reliability
Exam 1: Accounting Information Systems83 Questions
Exam 2: Overview of Business Processes105 Questions
Exam 3: Systems Development and Documentation Techniques99 Questions
Exam 4: Relational Databases90 Questions
Exam 5: Computer Fraud and Security95 Questions
Exam 6: Control and Accounting Information Systems87 Questions
Exam 7: Infromation System Controls for Systems Reliability82 Questions
Exam 8: Auditing Computer-Based Information Systems77 Questions
Exam 9: Auditing Computer-Based Informtion Systems94 Questions
Exam 10: The Revenue Cycle: Sales an Cash Collections94 Questions
Exam 11: The Expenditure Cycle: Purchasing and Cash Disbursements89 Questions
Exam 12: The Production Cycle87 Questions
Exam 13: The Human Resources Managementpayroll Cycle93 Questions
Exam 14: General Ledger and Reporting System81 Questions
Exam 15: Data Modeling and Database Design80 Questions
Exam 16: Implementing an Rea Model in a Relational Database77 Questions
Exam 17: Special Topics in Rea Modeling77 Questions
Exam 18: Introduction to Systems Development and Systems Analysis94 Questions
Exam 19: Ais Development Strategies95 Questions
Exam 20: Systems Design, Implementation and Operation86 Questions
Select questions type
These are used to create digital signatures.
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
A
Using a combination of symmetric and asymmetric key encryption,Chris Kai sent a report to her home office in Syracuse,New York.She received an email acknowledgement that the document had been received and then,a few minutes later,she received a second email that indicated that the hash calculated from the report differed from that sent with the report.This most likely explanation for this result is that
Free
(Multiple Choice)
5.0/5
(34)
Correct Answer:
C
This maintains a table that lists all established connections between the organization's computers and the Internet to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer..
(Multiple Choice)
4.8/5
(25)
Preventive controls require two related functions,which are:
(Multiple Choice)
4.9/5
(27)
There are "white hat" hackers and "black hat" hackers.Cowboy451 was one of the latter.He had researched an exploit and determined that he could penetrate the target system,download a file containing valuable data,and cover his tracks in eight minutes.Six minutes into the attack he was locked out of the system.Using the notation of the time-based model of security,which of the following must be true?
(Multiple Choice)
4.9/5
(33)
Restricting access of users to specific portions of the system as well as specific tasks,is
(Multiple Choice)
5.0/5
(35)
On February 14,2008,students enrolled in an economics course at Swingline College received an email stating that class would be cancelled.The email claimed to be from the professor,but it wasn't.Computer forensic experts determined that the email was sent from a computer in one of the campus labs at 9:14 A.M.They were then able to uniquely identify the computer that was used by means of its network interface card's ______ address.Security cameras revealed the identity of the student responsible for spoofing the class.
(Multiple Choice)
4.8/5
(25)
Identify the four basic principles that contribute to systems reliability according to the Trust Services framework developed by the AICPA and the CICA.
(Essay)
4.9/5
(42)
Which of the following is not associated with asymmetric encryption?
(Multiple Choice)
4.8/5
(24)
An electronic document that certifies the identity of the owner of a particular public key.
(Multiple Choice)
4.7/5
(42)
This creates logs of network traffic that was permitted to pass the firewall
(Multiple Choice)
4.8/5
(33)
These are established to deal with major security breaches.
(Multiple Choice)
4.9/5
(30)
The ___________ disseminates information about fraud,errors,breaches and other improper system uses and their consequences.
(Multiple Choice)
4.7/5
(31)
Which of the following is an example of a detective control?
(Multiple Choice)
4.8/5
(28)
Which of the following is not one of the three fundamental information security concepts?
(Multiple Choice)
4.9/5
(31)
Compatibility tests utilize a(n)__________,which is a list of authorized users,programs,and data files the users are authorized to access or manipulate.
(Multiple Choice)
4.8/5
(36)
The most effective way to protect network resources,like email servers,that are outside of the network and are exposed to the internet is
(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 82
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)