Exam 7: Infromation System Controls for Systems Reliability

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

It was 9:08 A.M.when Jiao Jan,the Network Administrator for Folding Squid Technologies,was informed that the intrusion detection system had identified an ongoing attempt to breach network security.By the time that Jiao had identified and blocked the attack,the hacker had accessed and downloaded several files from the company's server.Using the notation for the time-based model of security,in this case

(Multiple Choice)
4.8/5
(34)

This is an authorized attempt by an internal audit team or an external security consultant to break into the organization's information system.

(Multiple Choice)
4.8/5
(35)

In recent years,many of the attacks carried out by hackers have relied on this type of vulnerability in computer software.

(Multiple Choice)
4.8/5
(36)

This is designed to identify and drop packets that are part of an attack.

(Multiple Choice)
4.7/5
(39)

When new employees are hired by Folding Squid Technologies,they are assigned user names and passwords and provided with laptop computers that have an integrated fingerprint reader.In order to log in,the user's fingerprint must be recognized by the reader.This is an example of a(an)

(Multiple Choice)
4.8/5
(36)

Which of the following is an example of a corrective control?

(Multiple Choice)
4.8/5
(33)

When new employees are hired by Folding Squid Technologies,they are assigned user names and appropriate permissions are entered into the information system's access control matrix.This is an example of a(an)

(Multiple Choice)
4.9/5
(26)

On March 3,2008,a laptop computer belonging to Folding Squid Technology was stolen from the trunk of Jiao Jan's car while he was attending a conference in Cleveland,Ohio.After reporting the theft,Jiao considered the implications of the theft for the company's network security and concluded there was nothing to worry about because

(Multiple Choice)
4.7/5
(39)

What are the problems with symmetric encryption?

(Essay)
4.8/5
(43)

This screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header..

(Multiple Choice)
4.8/5
(34)

The AICPA and the CICA have created an evaluation service known as SysTrust.SysTrust follows four principles to determine if a system is reliable.The reliability principle that states that users must be able to enter,update,and retrieve data during agreed-upon times is known as

(Multiple Choice)
5.0/5
(32)

Which of the following is not one of the three important factors determining the strength of any encryption system?

(Multiple Choice)
4.8/5
(33)

Information encrypted with the creator's private key that is used to authenticate the sender is.

(Multiple Choice)
4.7/5
(28)

What three factors determine the strength of any encryption system?

(Essay)
4.8/5
(38)

One way to circumvent the counterfeiting of public keys is by using

(Multiple Choice)
4.9/5
(36)

Verifying the identity of the person or device attempting to access the system is

(Multiple Choice)
4.7/5
(37)

Which of the following is commonly true of the default settings for most commercially available wireless access points?

(Multiple Choice)
4.9/5
(38)

Giving users regular,periodic reminders about security policies and training in complying with them is an example of which of the following trust services criteria?

(Multiple Choice)
4.9/5
(32)

All employees of E.C.Hoxy are required to pass through a gate and present their photo identification cards to the guard before they are admitted.Entry to secure areas,such as the Information Technology Department offices,requires further procedures.This is an example of a(an)

(Multiple Choice)
4.9/5
(38)

Which of the following descriptions is not associated with symmetric encryption?

(Multiple Choice)
4.8/5
(33)
Showing 61 - 80 of 82
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)