Exam 7: Infromation System Controls for Systems Reliability
Exam 1: Accounting Information Systems83 Questions
Exam 2: Overview of Business Processes105 Questions
Exam 3: Systems Development and Documentation Techniques99 Questions
Exam 4: Relational Databases90 Questions
Exam 5: Computer Fraud and Security95 Questions
Exam 6: Control and Accounting Information Systems87 Questions
Exam 7: Infromation System Controls for Systems Reliability82 Questions
Exam 8: Auditing Computer-Based Information Systems77 Questions
Exam 9: Auditing Computer-Based Informtion Systems94 Questions
Exam 10: The Revenue Cycle: Sales an Cash Collections94 Questions
Exam 11: The Expenditure Cycle: Purchasing and Cash Disbursements89 Questions
Exam 12: The Production Cycle87 Questions
Exam 13: The Human Resources Managementpayroll Cycle93 Questions
Exam 14: General Ledger and Reporting System81 Questions
Exam 15: Data Modeling and Database Design80 Questions
Exam 16: Implementing an Rea Model in a Relational Database77 Questions
Exam 17: Special Topics in Rea Modeling77 Questions
Exam 18: Introduction to Systems Development and Systems Analysis94 Questions
Exam 19: Ais Development Strategies95 Questions
Exam 20: Systems Design, Implementation and Operation86 Questions
Select questions type
The trust services framework identifies four essential criteria for successfully implementing each of the principles that contribute to systems reliability.Which of the following is not one of those four essential criteria?
(Multiple Choice)
4.9/5
(37)
This determines which packets are allowed entry and which are dropped..
(Multiple Choice)
4.8/5
(40)
Which of the following is the most effective method of protecting against social engineering attacks on a computer system?
(Multiple Choice)
4.8/5
(38)
Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security.
(Multiple Choice)
4.9/5
(36)
This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.
(Multiple Choice)
4.9/5
(32)
Asymmetric key encryption combined with the information provided by a certificate authority allows unique identification of
(Multiple Choice)
4.9/5
(30)
Information technology managers are often in a bind when a new exploit is discovered in the wild.They can respond by updating the affected software or hardware with new code provided by the manufacturer,which runs the risk that a flaw in the update will break the system.Or they can wait until the new code has been extensively tested,but that runs the risk that they will be compromised by the exploit during the testing period.Dealing with these issues is referred to as
(Multiple Choice)
4.8/5
(38)
The process of turning off unnecessary features in the system is known as
(Multiple Choice)
4.9/5
(29)
In 2007,a major U.S.financial institution hired a security firm to attempt to compromise its computer network.A week later,the firm reported that it had successfully entered the system without apparent detection and presented an analysis of the vulnerabilities that had been found.This is an example of a
(Multiple Choice)
4.9/5
(38)
A special purpose hardware device or software running on a general purpose computer which filters information that is allowed to enter and leave the organization's information system.
(Multiple Choice)
4.7/5
(32)
Encryption has a remarkably long and varied history.Spies have been using it to convey secret messages ever since there were secret messages to convey.One powerful method of encryption uses random digits.Two documents are prepared with the same random sequence of numbers.The spy is sent out with one and the spy master retains the other.The digits are used as follows.Suppose that the word to be encrypted is SPY and the random digits are 352.Then S becomes V (three letters after S),P becomes U (five letters after P),and Y becomes A (two letters after Y,restarting at A after Z).The spy would encrypt a message and then destroy the document used to encrypt it.This is an early example of
(Multiple Choice)
4.8/5
(34)
Which of the following describes one weakness of encryption?
(Multiple Choice)
4.9/5
(32)
A process that takes plaintext of any length and transforms it into a short code.
(Multiple Choice)
4.7/5
(44)
Which of the following is not a requirement of effective passwords?
(Multiple Choice)
4.8/5
(35)
Showing 41 - 60 of 82
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)