Day 11 Flashcards

1
Q

Restricting entry of AP to only authorized users represents what type of control?

A

User Control

MCQ-07116

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is asymmetric encryption used?

A

Uses a public key to encrypt the message and a private key is used to decrypt the message at the other end

MCQ-06446

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define: Multimodal Authentication

A

Uses multiple biometrics such as, fingerprints, facial scanning, eye scanning, etc..

MCQ-09006

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A digital signature is primarily used to:

A

Determine that the message was sent by an Authentic Sender

MCQ-04814

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Public Key Infrastructure (PKI) represent?

A

Refers to a system and processes used to issue and manage asymmetric keys and digital certificates

MCQ-06453

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What pair of techniques provide the same level of assurance about the enforceability of a digitally signed transaction as a written signature provides for a paper based transaction?

A

Hashing and Asymmetric Encryption

MCQ-15783

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the disadvantage of Symmetric Encryption?

A

Both sender and receiver must have the private key for this encryption method to work

MCQ-04821

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To maintain effective segregation of duties in IT, an Application Programmer should have what responsibility?

A

Code approved changes to a payroll program

Note: An Application Programmer should NEVER be assigned the responsibility to correct data entry errors

MCQ-05777

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What best describes the Segregation of Duties?

A

Good internal control requires that no single employee be given too much responsibility over business transactions or processes. An employee should not be in a position to commit or conceal fraud

MCQ-06445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the roll of a Systems Analyst in an IT environment?

A

Designing systems, preparing specifications for programmers, and serving as an intermediary between users and programmers

MCQ-07117

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An uninterrupted power supply is what type of control?

A

Physical Control

MCQ-13036

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When implementing or developing a new software system, the first job roll to start the process is most likely?

A

System Analyst

  • The design of the systems should be done by a different employee from the one writing the software
  • An employee granting access to the system should be different from the one designing and writing

MCQ-14591

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary objective of Data Security Controls?

A

To ensure that storage media are subject to authorization prior to access, change, or destruction

MCQ-06984

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define: Incremental Backup

A

Involves copying only the data items that have changed since the last backup

MCQ-13033

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define: Differential Backup

A

Copies all changes made since the last full backup

Each new Differential Backup contains the cumulative effects of all activity since the last full backup

MCQ-13033

How well did you know this?
1
Not at all
2
3
4
5
Perfectly