ch 14 Flashcards

1
Q

Authentication is the process by which the

A

system verifies the identity of the user

Prove its you/ verify who you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To enrue confidentiality in a asymmetric key enrcyption ststem, knowledge of which of the follling keys is required to decrypt the recieve message

1. Private
2. Public

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To euthenticate the message sender in an asymmetric key enecryption which key is required to decrypt the recived message

A

Senders public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To ensure the data sent over the internet are protected which of the following keys is required to encrypt the data (before tranmission) using an asymmetric key encrytion

A

Receivers public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following groups/laws was the earlies to encorage auditors to incorporate fraud examination into audit programs

A

SAS NO. 99

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Incentive to commit fraud usually would include all of the following:

A
  1. resentment
  2. finanical pressure
  3. personal habits and lifestyle
  4. alcohol, drug, or gambiling addication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The symmetric encryption method has the – keys for –

A

Uses same key for both senders and receivers for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To prevent repudiation in conducting E-business, compaies must be able to authenticate their trading partners. Which of the following encryption methods can be used for authentication prupose?

A

Asymmetric key encryption method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which organization created the reporting on an entity cybersecurity risk management program and controls: ATTESTATION GUIDE IN 2017

A

AICPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business continuity management is a – control

A

corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption is a – control

A

preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is one tech issue for CPA

A

Info secutiry management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information secutiry has a critical factor in

A

maintaining system integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information secutiry and sytem integrity

  1. social engineering
A
  1. manipulate somone to do this or that
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption is a - control

A

preventitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two algorithmic schemes?

A
  1. symmetric
  2. asymetic

key encryption

17
Q

Symmetric key includes:

A
  1. fast
  2. sutable for large data
  3. difficlut to distribute key
  4. one key is not cost effective
18
Q

Asymmetric key include

A
  1. slow
  2. not for large data
  3. public key is used while private key is secret
  4. transmit confidential information
19
Q

What are the 3 factors of encryption

A
  1. Encryption algo
  2. key length
  3. key managment
20
Q

Define authentication

A

gets you in, acess what you can do

21
Q

Cerficate authority

A

trust entity that issues and revoke digital certificate

22
Q

Digital certificate

A

binds private key to owner and public key

23
Q

What is the triangle fraud

A
  1. Incentive
  2. opportunity
  3. Rationalize
24
Q

Define the fraud triangle
1. Incentive
2. opportunity
3. Rationalize

A
  1. reason to commit fraud (money, wants)
  2. Must be the opportunty to do the act (lack of supervsion)
  3. “justification” (I’ll pay it back later)
25
Uninterruptible power supply
back up generators
26
Fault tolerance
tolerate some failure
27
Virtualization or Cloud computing
back up data
28
Disaster recovery planning (DRP)
a plan of what to do if this happens
29
Business continuity management (BCM)
other external things that affect the firm | political/ competitor
30
DRP and BCM are the most critical -- controls
corrective
31
Using a digital signature, what is used to encrypt and what is used to decrypt a message digest?
The private key to encrypt and the public key to decrypt
32
Who is responsible for the fraud risk assessment for an organization?
Management at each division