Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 1
Quiz 4: Internal Controls and Risks in IT Systems
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
A self-replicating piece of program code that can attach itself to other programs and data and perform malicious actions is referred to as a(n) :
Question 42
Multiple Choice
The process of proactively examining the IT system for weaknesses that can be exploited by hackers, viruses, or malicious employees is called:
Question 43
Multiple Choice
This encryption method, used with wireless network equipment, is symmetric in that both the sending and receiving network nodes must use the same encryption key.It has been proven to be susceptible to hacking.
Question 44
Multiple Choice
The IT Governance Committee has several important responsibilities.Which of the following is not normally one of those responsibilities?
Question 45
Multiple Choice
This form of encryption uses a public key, which is known by everyone, to encrypt data, and a private key, to decode the data.
Question 46
Multiple Choice
This encryption method requests connection to the network via an access point and that point then requests the use identity and transmits that identity to an authentication server, substantially authenticating the computer and the user.
Question 47
Multiple Choice
This communication protocol is built into web server and browser software that encrypts data transferred on that website.You can determine if a website uses this technology by looking at the URL.
Question 48
Multiple Choice
The type of network uses tunnels, authentication, and encryption within the Internet network to isolate Internet communications so that unauthorized users cannot access or use certain data.
Question 49
Multiple Choice
This form of encryption uses a single encryption key that must be used to encrypt data and also to decode the encrypted data.
Question 50
Multiple Choice
This security feature, used on wireless networks, is a password that is passed between the sending and receiving nodes of a wireless network.
Question 51
Multiple Choice
Which of the following URL's would indicate that the site is using browser software that encrypts data transferred to the website?
Question 52
Multiple Choice
A small piece of program code that attaches to the computer's unused memory space and replicates itself until the system becomes overloaded and shuts down is called:
Question 53
Multiple Choice
The process of legitimately attempting to hack into an IT system to find whether weaknesses can be exploited by unauthorized hackers is referred to as:
Question 54
Multiple Choice
This method of monitoring exposure can involve either manual testing or automated software tools.The method can identify weaknesses before they become network break-ins and attempt to fix these weaknesses before they are exploited.
Question 55
Multiple Choice
Authorized employees may need to access the company IT system from locations outside the organization.These employees should connect to the IT system using this type of network.
Question 56
Multiple Choice
The function of this committee is to govern the overall development and operation of IT systems.
Question 57
Multiple Choice
This type of software should be used to avoid destruction of data programs and to maintain operation of the IT system.It continually scans the system for viruses and worms and either deletes or quarantines them.
Question 58
Multiple Choice
Specific software tools that monitor data flow within a network and alert the IT staff to hacking attempts or other unauthorized access attempts is called:
Question 59
Multiple Choice
The functional responsibilities within an IT system must include the proper segregation of duties.Which of the following positions is not one of the duties that is to be segregated from the others?