Filters
Question type

Study Flashcards

Information security is a critical factor in maintaining systems integrity.

Correct Answer

verifed

verified

Disaster recovery planning and business continuity management are preventive controls.

Correct Answer

verifed

verified

Encryption is a preventive control ensuring data confidentiality and privacy during transmission and for storage.

Correct Answer

verifed

verified

Which of the following passwords would be most difficult to crack?


A) Go2Ca!ifornia4fun
B) language
C) jennyjenny
D) pass56word

Correct Answer

verifed

verified

Which of the following statements regarding authentication in conducting e-business is incorrect?


A) It is a process that establishes the origin of information or determines the identity of a user, process, or device.
B) One key is used for encryption and decryption purposes in the authentication process.
C) Successful authentication can prevent repudiation in electronic transactions.
D) We need to use asymmetric-key encryption to authenticate the sender of a document or data set.

Correct Answer

verifed

verified

Bacchus,Inc.is a larger multinational corporation with various business units around the world.After a fire destroyed the corporation headquarters and largest manufacturing site,plans for which of the following would help Bacchus ensure a timely recovery?


A) Daily backup.
B) Network security.
C) Business continuity.
D) Backup power.

Correct Answer

verifed

verified

What are the two prerequisites for vulnerability management?

Correct Answer

verifed

verified

First,determine the main objectives of i...

View Answer

One type of fault tolerance is using redundant units to provide a system the ability to continue functioning when part of the system fails.

Correct Answer

verifed

verified

Encryption and hashing are similar process to maintain data confidentiality.

Correct Answer

verifed

verified

What is the primary objective of data security controls?


A) To establish a framework for controlling the design, security, and use of computer programs throughout an organization.
B) To ensure that data storage media are subject to authorization prior to access, change, or destruction.
C) To formalize standard, rules, and procedures to ensure the organization's control are properly executed.
D) To monitor the use of system software to prevent unauthorized access to system software and computer programs.

Correct Answer

verifed

verified

Fraud triangle includes incentive,opportunity and an attitude to rationalize the fraud.

Correct Answer

verifed

verified

Which of the following is a password security weakness?


A) Users are assigned passwords when accounts are created, but do not change them.
B) Users have accounts on several systems with different passwords.
C) Users write down their passwords on a note paper, and carry it with them.
D) Users select passwords that are not part of online password dictionary.

Correct Answer

verifed

verified

Symmetric-key encryption method is used to authenticate users.

Correct Answer

verifed

verified

Virus is a self-replicating,self-propagating,self-contained program that uses networking mechanisms to spread itself.

Correct Answer

verifed

verified

Describe the framework for vulnerability assessment and vulnerability management.

Correct Answer

verifed

verified

The components of vulnerability assessme...

View Answer

Select a correct statement regarding encryption methods?


A) To use symmetric-key encryption, each user needs two different keys.
B) Most companies prefer using symmetric-key encryption than asymmetric-key encryption method.
C) Both symmetric-key and asymmetric-key encryption methods require the involvement of a certificate authority.
D) When conducting e-business, most companies use both symmetric-key and asymmetric-key encryption methods.

Correct Answer

verifed

verified

Certificate Authority (CA)issues digital certificates to bond the subscriber with a public key and a private key.

Correct Answer

verifed

verified

Which of the following security controls would best prevent unauthorized access to a firm's internal network?


A) Use of a screen saver with a password.
B) Use of a firewall.
C) Encryption of data files.
D) Automatic log-off of inactive users.

Correct Answer

verifed

verified

An information technology director collected the names and locations of key vendors,current hardware configuration,names of team members,and an alternative processing location.What is the director most likely preparing?


A) Data restoration plan.
B) Disaster recovery plan.
C) System security policy.
D) System hardware policy.

Correct Answer

verifed

verified

When computer programs or files can be accessed from terminals,users should be required to enter a(n)


A) Parity check.
B) Password as a personal identification code.
C) Check digit.
D) Echo check.

Correct Answer

verifed

verified

Showing 21 - 40 of 47

Related Exams

Show Answer