Module 5+6 (Ch 14-18) Flashcards
What role is appropriate for COO, overseeing and guiding day-to-day operations of the company?
Read-only
What role is appropriate for Tax Accountant, responsible for financial tax statements? Researches the financials to ensure the company is following tax laws.
Creator
What role is appropriate for Accounting Director, responsible for directing the accounting department?
Administrator
What role is appropriate for Regional sales manager, overseeing the sales department?
Read-only
What role is appropriate for PR Manager?
Denied Access
What role is appropriate for Internal Auditor?
Read-only
What role is appropriate for Compensation and benefits manager?
Denied access
What role is appropriate for Marketing Manager?
Denied Access
The backup strategy that copies all existing data every time is ______.
Full backup
The backup strategy used in the ‘son’ backup cycle is ____.
Differential Backup
The cheapest backup strategy, which uses the lease amount of storage space is _____.
Incremental backup
The middle ground of backup strategies is _____.
Differential backup
The data strategy used in the ‘father’ backup cycle is _____.
Full backup
Also known as ‘sand box’ and is where developers design and test coding.
Test environment
Environment where developer no longer has access to ensure segregation of duties.
Model environment and Production environment
Environment where user acceptance takes place.
Model environment
Environment where outputs include testing documentation.
Test environment
Environment where outputs include live code in the system.
Production environment
Environment where outputs include initial code.
Test environment
Environment where the business user or IT analyst no longer has access to the code to ensure segregation of duties.
Production environment
There is currently a motion being filed to suspend all bank accounts and tax returns bearing your name and Social Security number. To review immediate rights and details and avoid all further proceedings, please contact our firm by clicking the link provided.
Fear, urgency
Help a family in need this holiday season by providing them with a warm meal. A small donation of only $3 can provide a meal for a community member needing your help. Click the following link to make your donation on our easy-to-use web portal.
Helpfulness
We have been reviewing your bank account information and it seems someone has made a large, unauthorized purchase. Please call us now at 1-800-987-6543 to discuss these changes and to protect your accounts.
Curiosity, fear
You and your attorney have a very brief window to address this matter with our office. It would serve your best interest to contact our offices before close of business today or immediately upon receipt of this message. This message servers as a legal notification of a civil complaint filed against you.
Fear, urgency
Cybersecurity Risk? A company website is down for two hours after a software update resulted in compatibility issues.
No
Cybersecurity Risk? A staff accountant opened an email attachment that contained the CryptoLocker virus.
Yes
Cybersecurity Risk? An employee lost an external hard drive while on a business trip. The hard drive contained corporate financial information.
Yes
Cybersecurity Risk? The data center’s backup power failed to turn on during a power outage.
No
Cybersecurity Risk? Three servers cannot be backed up due to the backup size exceeding a system’s storage capacity.
No
Cybersecurity Risk? Employees have stated that they are receiving an increased number of pop-up ads on company computers.
Yes
What type of cyber attack demands ransom payment after accessing files?
Ransomware
What type of cyberattack shuts down the company’s network?
Denial-of-service
What type of cyberattack shows a delayed attack?
Logic bomb
NIST family: HR and IT collaborate to provide annual training on phishing emails.
Awareness and training
NIST family: IT department conducts penetration testing annually.
Security assessment and authorization
NIST family: System resources are monitored to ensure that sufficient resources exist to support unexpected network traffic.
System and communications protection