Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 6
Quiz 8: Controls for Information Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Kuzman Jovan called a meeting of the top management at Jovan Capital Management.Number one on the agenda was computer system security."The risk of security breach incidents has become unacceptable," he said,and turned to the Chief Information Officer."What do you intend to do?" Which of the following is the best answer?
Question 2
Multiple Choice
According to the Trust Services Framework,the reliability principle of integrity is achieved when the system produces data that
Question 3
Multiple Choice
The Trust Services Framework reliability principle that states access to the system and its data should be accessible to meet operational and contractual obligations to legitimate users is known as
Question 4
Multiple Choice
There are "white hat" hackers and "black hat" hackers.Cowboy451 was one of the "black hat" hackers.He had researched an exploit and determined that he could penetrate the target system,download a file containing valuable data,and cover his tracks in eight minutes.Six minutes into the attack he was locked out of the system.Using the notation of the time-based model of security,which of the following must be true?
Question 5
Multiple Choice
Identify a party below who was involved with developing the Trust Services Framework.
Question 6
Multiple Choice
In the time-based model of information security,P represents
Question 7
Multiple Choice
The Trust Services Framework reliability principle that states personal information should be protected from unauthorized disclosure is known as
Question 8
Multiple Choice
It was 8:03 A.M.when Jiao Jan,the Network Administrator for South Asian Technologies,was informed that the intrusion detection system had identified an ongoing attempt to breach network security.By the time that Jiao had identified and blocked the attack,the hacker had accessed and downloaded several files from the company's server.Using the notation for the time-based model of security,in this case
Question 9
Multiple Choice
Which of the following is not one of the essential criteria for successfully implementing each of the principles that contribute to systems reliability,as discussed in the Trust Services Framework?
Question 10
Multiple Choice
Information security procedures protect information integrity by
Question 11
True/False
Security is a technology issue and not just a management issue.
Question 12
Multiple Choice
According to the Trust Services Framework,the reliability principle of availability is achieved when the system produces data that
Question 13
Multiple Choice
The Trust Services Framework reliability principle that states that users must be able to enter,update,and retrieve data during agreed-upon times is known as
Question 14
Essay
Describe the five principles of the Trust Services Framework.Select one of the principles and discuss the why it is important to an organization.
Question 15
Multiple Choice
The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as
Question 16
Multiple Choice
Which of the following is not one of the three fundamental information security concepts?
Question 17
Multiple Choice
If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack,then security is