Exam 7: Infromation System Controls for Systems Reliability
Exam 1: Accounting Information Systems83 Questions
Exam 2: Overview of Business Processes105 Questions
Exam 3: Systems Development and Documentation Techniques99 Questions
Exam 4: Relational Databases90 Questions
Exam 5: Computer Fraud and Security95 Questions
Exam 6: Control and Accounting Information Systems87 Questions
Exam 7: Infromation System Controls for Systems Reliability82 Questions
Exam 8: Auditing Computer-Based Information Systems77 Questions
Exam 9: Auditing Computer-Based Informtion Systems94 Questions
Exam 10: The Revenue Cycle: Sales an Cash Collections94 Questions
Exam 11: The Expenditure Cycle: Purchasing and Cash Disbursements89 Questions
Exam 12: The Production Cycle87 Questions
Exam 13: The Human Resources Managementpayroll Cycle93 Questions
Exam 14: General Ledger and Reporting System81 Questions
Exam 15: Data Modeling and Database Design80 Questions
Exam 16: Implementing an Rea Model in a Relational Database77 Questions
Exam 17: Special Topics in Rea Modeling77 Questions
Exam 18: Introduction to Systems Development and Systems Analysis94 Questions
Exam 19: Ais Development Strategies95 Questions
Exam 20: Systems Design, Implementation and Operation86 Questions
Select questions type
A more rigorous test of the effectiveness of an organization's computer security.
(Multiple Choice)
4.9/5
(33)
In developing policies related to personal information about customers,Folding Squid Technologies adhered to the Trust Services framework.The standard applicable to these policies is
(Multiple Choice)
4.9/5
(31)
Which of the following is not one of the five basic principles that contribute to systems reliability according to the Trust Services framework.
(Multiple Choice)
4.9/5
(39)
In a private key system the sender and the receiver have __________,and in the public key system they have __________.
(Multiple Choice)
4.8/5
(31)
The device that connects an organization's information system to the Internet is a
(Multiple Choice)
4.8/5
(37)
Which of the following is an example of a preventive control?
(Multiple Choice)
4.8/5
(29)
If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack,then security is
(Multiple Choice)
4.8/5
(31)
This uses automated tools to identify whether a given system possesses any well-known security problems.
(Multiple Choice)
4.8/5
(36)
Which of the following preventive controls are necessary to provide adequate security that deals with social engineering?
(Multiple Choice)
4.9/5
(32)
This processes involves the firewall examining the data in the body of an IP packet.
(Multiple Choice)
4.9/5
(27)
Murray Snitzel called a meeting of the top management at Snitzel Capital Management.Number one on the agenda was computer system security."The risk of security breach incidents has become unacceptable," he said,and turned to the Chief Information Officer."This your responsibility! What do you intend to do?" Which of the following is the best answer?
(Multiple Choice)
4.8/5
(35)
This is used to identify rogue modems (or by hackers to identify targets).
(Multiple Choice)
4.9/5
(42)
The system and processes used to issue and manage asymmetric keys and digital certificates.
(Multiple Choice)
4.7/5
(37)
Meaningful Discussions is a social networking site that boasts over a million registered users and a quarterly membership growth rate in the double digits.As a consequence,the size of the information technology department has been growing very rapidly,with many new hires.Each employee is provided with a name badge with a photo and embedded computer chip that is used to gain entry to the facility.This is an example of a(an)
(Multiple Choice)
4.9/5
(30)
According to SysTrust,the reliability principle of integrity is achieved when
(Multiple Choice)
5.0/5
(39)
This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination.
(Multiple Choice)
4.9/5
(34)
Encryption has a remarkably long and varied history.The invention of writing was apparently soon followed by a desire to conceal messages.One of the earliest methods,attributed to an ancient Roman emperor,was the simple substitution of numbers for letters,for example A = 1,B = 2,etc.This is an example of
(Multiple Choice)
4.7/5
(40)
Showing 21 - 40 of 82
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)