Filters
Question type

Study Flashcards

Why would companies want to use digital signatures when conducting e-business?


A) They are cheap.
B) They are always the same so it can be verified easily.
C) They are more convenient than requiring a real signature.
D) They can authenticate the document sender and maintain data integrity.

Correct Answer

verifed

verified

Which of the following IT controls would best prevent a developer from inappropriately accessing the system?


A) Forced password changes.
B) Secondary code review.
C) Symmetric encryption.
D) Lack of authentication.

Correct Answer

verifed

verified

The purpose of using a digital signature is for authentication.

Correct Answer

verifed

verified

Which of the following best illustrates the use of multifactor authentication?


A) Requiring password changes every 30,60,or 90 days.
B) Requiring the use of a smart card and a password.
C) Requiring the use of upper case,lower case,numeric,and special characters for a password.
D) The use of a fingerprint scanner for access to a device.

Correct Answer

verifed

verified

When using asymmetric encryption algorithm,for two trading parties to conduct e-business,they need to use two keys.

Correct Answer

verifed

verified

Which of the following is a password security weakness?


A) Users are assigned passwords when accounts are created,but do not change them.
B) Users have accounts on several systems with different passwords.
C) Users write down their passwords on a note paper,and carry it with them.
D) Users select passwords that are not part of an online password dictionary.

Correct Answer

verifed

verified

Disaster recovery planning and business continuity management are unrealted.

Correct Answer

verifed

verified

Which of the following is not one of the main components of vulnerability management and assessment?


A) Identification.
B) Remediation.
C) Internalization.
D) Maintenance.

Correct Answer

verifed

verified

Key distribution and key management are problematic under the symmetric-key encryption.

Correct Answer

verifed

verified

The goal of information security management is to enhance the confidence,integrity and authority (CIA)of a firm's information.

Correct Answer

verifed

verified

What is the primary objective of data security controls?


A) To establish a framework for controlling the design,security,and use of computer programs throughout an organization.
B) To ensure that data storage media are subject to authorization prior to access,change,or destruction.
C) To formalize standard,rules,and procedures to ensure the organization's control are properly executed.
D) To monitor the use of system software to prevent unauthorized access to system software and computer programs.

Correct Answer

verifed

verified

Which of the following controls would most likely assure that a company can reconstruct its financial records?


A) Security controls such as firewalls.
B) Backup data are tested and stored safely.
C) Personnel understand the data very well.
D) Paper records.

Correct Answer

verifed

verified

A disaster recovery approach should include which of the following elements?


A) Encryption.
B) Firewalls.
C) Regular backups.
D) Surge protectors.

Correct Answer

verifed

verified

A Public Key Infrastructure (PKI) provides the ability to do which of the following?


A) Encrypt messages using a private key.
B) Enable debit and credit card transactions.
C) Read plaintext.
D) Issue,maintain,and revoke digital certificates.

Correct Answer

verifed

verified

Select a correct statement regarding encryption methods?


A) To use symmetric-key encryption,each user needs two different keys.
B) Most companies prefer using symmetric-key encryption than asymmetric-key encryption method.
C) Both symmetric-key and asymmetric-key encryption methods require the involvement of a certificate authority.
D) When conducting e-business,most companies use both symmetric-key and asymmetric-key encryption methods.

Correct Answer

verifed

verified

An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except:


A) Password management.
B) Data encryption.
C) Digital certificates.
D) Batch processing.

Correct Answer

verifed

verified

Encryption and hashing are similar process to maintain data confidentiality.

Correct Answer

verifed

verified

A RAID array implemented in a data center is an example of which of the following?


A) Virtualization.
B) Uninterruptible power supply.
C) Fault tolerance.
D) SOC 3.

Correct Answer

verifed

verified

Both ISACA and the GTAG define vulnerability.Which of the following does not represent one of these definitions?


A) The nature of IT resources that can be exploited by a threat to cause damage.
B) An organizations' exposure to disaster.
C) Weaknesses or exposures in IT assets that may lead to business,compliance,or security risk.
D) All of the other items represent the definitions of vulnerability stated by ISACA and the GTAG.

Correct Answer

verifed

verified

Which of the following does not represent a viable data backup method?


A) Disaster recovery plan.
B) Redundant arrays of independent drives.
C) Virtualization.
D) Cloud computing.

Correct Answer

verifed

verified

Showing 21 - 40 of 58

Related Exams

Show Answer