Exam 7: Infromation System Controls for Systems Reliability

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

These are used to create digital signatures.

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

A

Multi-factor authentication

Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
Verified

A

Using a combination of symmetric and asymmetric key encryption,Chris Kai sent a report to her home office in Syracuse,New York.She received an email acknowledgement that the document had been received and then,a few minutes later,she received a second email that indicated that the hash calculated from the report differed from that sent with the report.This most likely explanation for this result is that

Free
(Multiple Choice)
5.0/5
(34)
Correct Answer:
Verified

C

This maintains a table that lists all established connections between the organization's computers and the Internet to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer..

(Multiple Choice)
4.8/5
(25)

Preventive controls require two related functions,which are:

(Multiple Choice)
4.9/5
(27)

There are "white hat" hackers and "black hat" hackers.Cowboy451 was one of the latter.He had researched an exploit and determined that he could penetrate the target system,download a file containing valuable data,and cover his tracks in eight minutes.Six minutes into the attack he was locked out of the system.Using the notation of the time-based model of security,which of the following must be true?

(Multiple Choice)
4.9/5
(33)

Restricting access of users to specific portions of the system as well as specific tasks,is

(Multiple Choice)
5.0/5
(35)

On February 14,2008,students enrolled in an economics course at Swingline College received an email stating that class would be cancelled.The email claimed to be from the professor,but it wasn't.Computer forensic experts determined that the email was sent from a computer in one of the campus labs at 9:14 A.M.They were then able to uniquely identify the computer that was used by means of its network interface card's ______ address.Security cameras revealed the identity of the student responsible for spoofing the class.

(Multiple Choice)
4.8/5
(25)

Identify the four basic principles that contribute to systems reliability according to the Trust Services framework developed by the AICPA and the CICA.

(Essay)
4.9/5
(42)

Which of the following is not associated with asymmetric encryption?

(Multiple Choice)
4.8/5
(24)

An electronic document that certifies the identity of the owner of a particular public key.

(Multiple Choice)
4.7/5
(42)

This creates logs of network traffic that was permitted to pass the firewall

(Multiple Choice)
4.8/5
(33)

These are established to deal with major security breaches.

(Multiple Choice)
4.9/5
(30)

The ___________ disseminates information about fraud,errors,breaches and other improper system uses and their consequences.

(Multiple Choice)
4.7/5
(31)

Which of the following is an example of a detective control?

(Multiple Choice)
4.8/5
(28)

What are the three fundamental information security concepts?

(Essay)
4.9/5
(33)

Which of the following is not one of the three fundamental information security concepts?

(Multiple Choice)
4.9/5
(31)

Explain the value of penetration testing.

(Essay)
4.9/5
(36)

Compatibility tests utilize a(n)__________,which is a list of authorized users,programs,and data files the users are authorized to access or manipulate.

(Multiple Choice)
4.8/5
(36)

The most effective way to protect network resources,like email servers,that are outside of the network and are exposed to the internet is

(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 82
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)