Day 11 Flashcards
Restricting entry of AP to only authorized users represents what type of control?
User Control
MCQ-07116
How is asymmetric encryption used?
Uses a public key to encrypt the message and a private key is used to decrypt the message at the other end
MCQ-06446
Define: Multimodal Authentication
Uses multiple biometrics such as, fingerprints, facial scanning, eye scanning, etc..
MCQ-09006
A digital signature is primarily used to:
Determine that the message was sent by an Authentic Sender
MCQ-04814
What does Public Key Infrastructure (PKI) represent?
Refers to a system and processes used to issue and manage asymmetric keys and digital certificates
MCQ-06453
What pair of techniques provide the same level of assurance about the enforceability of a digitally signed transaction as a written signature provides for a paper based transaction?
Hashing and Asymmetric Encryption
MCQ-15783
What is the disadvantage of Symmetric Encryption?
Both sender and receiver must have the private key for this encryption method to work
MCQ-04821
To maintain effective segregation of duties in IT, an Application Programmer should have what responsibility?
Code approved changes to a payroll program
Note: An Application Programmer should NEVER be assigned the responsibility to correct data entry errors
MCQ-05777
What best describes the Segregation of Duties?
Good internal control requires that no single employee be given too much responsibility over business transactions or processes. An employee should not be in a position to commit or conceal fraud
MCQ-06445
What is the roll of a Systems Analyst in an IT environment?
Designing systems, preparing specifications for programmers, and serving as an intermediary between users and programmers
MCQ-07117
An uninterrupted power supply is what type of control?
Physical Control
MCQ-13036
When implementing or developing a new software system, the first job roll to start the process is most likely?
System Analyst
- The design of the systems should be done by a different employee from the one writing the software
- An employee granting access to the system should be different from the one designing and writing
MCQ-14591
What is the primary objective of Data Security Controls?
To ensure that storage media are subject to authorization prior to access, change, or destruction
MCQ-06984
Define: Incremental Backup
Involves copying only the data items that have changed since the last backup
MCQ-13033
Define: Differential Backup
Copies all changes made since the last full backup
Each new Differential Backup contains the cumulative effects of all activity since the last full backup
MCQ-13033