ch 14 Flashcards

1
Q

Authentication is the process by which the

A

system verifies the identity of the user

Prove its you/ verify who you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To enrue confidentiality in a asymmetric key enrcyption ststem, knowledge of which of the follling keys is required to decrypt the recieve message

1. Private
2. Public

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To euthenticate the message sender in an asymmetric key enecryption which key is required to decrypt the recived message

A

Senders public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To ensure the data sent over the internet are protected which of the following keys is required to encrypt the data (before tranmission) using an asymmetric key encrytion

A

Receivers public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following groups/laws was the earlies to encorage auditors to incorporate fraud examination into audit programs

A

SAS NO. 99

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Incentive to commit fraud usually would include all of the following:

A
  1. resentment
  2. finanical pressure
  3. personal habits and lifestyle
  4. alcohol, drug, or gambiling addication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The symmetric encryption method has the – keys for –

A

Uses same key for both senders and receivers for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To prevent repudiation in conducting E-business, compaies must be able to authenticate their trading partners. Which of the following encryption methods can be used for authentication prupose?

A

Asymmetric key encryption method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which organization created the reporting on an entity cybersecurity risk management program and controls: ATTESTATION GUIDE IN 2017

A

AICPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business continuity management is a – control

A

corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption is a – control

A

preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is one tech issue for CPA

A

Info secutiry management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information secutiry has a critical factor in

A

maintaining system integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information secutiry and sytem integrity

  1. social engineering
A
  1. manipulate somone to do this or that
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption is a - control

A

preventitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two algorithmic schemes?

A
  1. symmetric
  2. asymetic

key encryption

17
Q

Symmetric key includes:

A
  1. fast
  2. sutable for large data
  3. difficlut to distribute key
  4. one key is not cost effective
18
Q

Asymmetric key include

A
  1. slow
  2. not for large data
  3. public key is used while private key is secret
  4. transmit confidential information
19
Q

What are the 3 factors of encryption

A
  1. Encryption algo
  2. key length
  3. key managment
20
Q

Define authentication

A

gets you in, acess what you can do

21
Q

Cerficate authority

A

trust entity that issues and revoke digital certificate

22
Q

Digital certificate

A

binds private key to owner and public key

23
Q

What is the triangle fraud

A
  1. Incentive
  2. opportunity
  3. Rationalize
24
Q

Define the fraud triangle
1. Incentive
2. opportunity
3. Rationalize

A
  1. reason to commit fraud (money, wants)
  2. Must be the opportunty to do the act (lack of supervsion)
  3. “justification” (I’ll pay it back later)
25
Q

Uninterruptible power supply

A

back up generators

26
Q

Fault tolerance

A

tolerate some failure

27
Q

Virtualization or Cloud computing

A

back up data

28
Q

Disaster recovery planning (DRP)

A

a plan of what to do if this happens

29
Q

Business continuity management (BCM)

A

other external things that affect the firm

political/ competitor

30
Q

DRP and BCM are the most critical – controls

A

corrective

31
Q

Using a digital signature, what is used to encrypt and what is used to decrypt a message digest?

A

The private key to encrypt and the public key to decrypt

32
Q

Who is responsible for the fraud risk assessment for an organization?

A

Management at each division