A) They are cheap.
B) They are always the same so it can be verified easily.
C) They are more convenient than requiring a real signature.
D) They can authenticate the document sender and maintain data integrity.
Correct Answer
verified
Multiple Choice
A) Forced password changes.
B) Secondary code review.
C) Symmetric encryption.
D) Lack of authentication.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Requiring password changes every 30,60,or 90 days.
B) Requiring the use of a smart card and a password.
C) Requiring the use of upper case,lower case,numeric,and special characters for a password.
D) The use of a fingerprint scanner for access to a device.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Users are assigned passwords when accounts are created,but do not change them.
B) Users have accounts on several systems with different passwords.
C) Users write down their passwords on a note paper,and carry it with them.
D) Users select passwords that are not part of an online password dictionary.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Identification.
B) Remediation.
C) Internalization.
D) Maintenance.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) To establish a framework for controlling the design,security,and use of computer programs throughout an organization.
B) To ensure that data storage media are subject to authorization prior to access,change,or destruction.
C) To formalize standard,rules,and procedures to ensure the organization's control are properly executed.
D) To monitor the use of system software to prevent unauthorized access to system software and computer programs.
Correct Answer
verified
Multiple Choice
A) Security controls such as firewalls.
B) Backup data are tested and stored safely.
C) Personnel understand the data very well.
D) Paper records.
Correct Answer
verified
Multiple Choice
A) Encryption.
B) Firewalls.
C) Regular backups.
D) Surge protectors.
Correct Answer
verified
Multiple Choice
A) Encrypt messages using a private key.
B) Enable debit and credit card transactions.
C) Read plaintext.
D) Issue,maintain,and revoke digital certificates.
Correct Answer
verified
Multiple Choice
A) To use symmetric-key encryption,each user needs two different keys.
B) Most companies prefer using symmetric-key encryption than asymmetric-key encryption method.
C) Both symmetric-key and asymmetric-key encryption methods require the involvement of a certificate authority.
D) When conducting e-business,most companies use both symmetric-key and asymmetric-key encryption methods.
Correct Answer
verified
Multiple Choice
A) Password management.
B) Data encryption.
C) Digital certificates.
D) Batch processing.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Virtualization.
B) Uninterruptible power supply.
C) Fault tolerance.
D) SOC 3.
Correct Answer
verified
Multiple Choice
A) The nature of IT resources that can be exploited by a threat to cause damage.
B) An organizations' exposure to disaster.
C) Weaknesses or exposures in IT assets that may lead to business,compliance,or security risk.
D) All of the other items represent the definitions of vulnerability stated by ISACA and the GTAG.
Correct Answer
verified
Multiple Choice
A) Disaster recovery plan.
B) Redundant arrays of independent drives.
C) Virtualization.
D) Cloud computing.
Correct Answer
verified
Showing 21 - 40 of 58
Related Exams