TBS - 1 - 7 - 35% Flashcards

1
Q

Biometrics

A

Authenticate identity using an individual’s unique body features such as voice, retina, fingerprint, or signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Multi-factor identification

A

Requiring multiple types of ID such as knowledge (password), device (keycard), and body (voiceprint or finger print)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Piggybacking

A

An unauthorized user gains entry into a restricted area by following an authorized user, using the authorized user’s entry credentials to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

Requests for information delivered via email or text messages (aka smashing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Packet sniffing

A

Programs that capture packets of data as they move across a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Segregation of Duties

A

Authorization
Approval
Custody
Record Keeping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example of fraud when duties aren’t segregated

A

Process fictitious purchase transactions to his own shell companies and cause payments to be made for goods or services that were not received by the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Primary advantage of online, real-time processing over batch processing

A

it provides more timely (and therefore more accurate) information for decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Batch System

A

Inventory data are only accurate when the records are updated (i.e. each month)

Therefore, decisions about ordering inventory, inventory value, and company profitability are not based on timely info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Online, real-time system information advantages

A

Information about inventory levels, inventory investment, and cost of goods sold would be available on a continuous basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption

A

The process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Encryption Technology

A

Uses a mathematical algorithm to translate cleartext into cipertext (text that has been mathematically scrambled so it’s meaning cannot be determined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption guards against

A

Risks to privacy, i.e. the protection of data-in-transit against unauthorized access and authentication, i.e. user ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric encryption

A

aka Single-Key encryption or private-key encryption uses a single algorithm to encrypt and decrypt text. The sender uses the encryption algorithm to create a ciphertext and sends the encrypted text to the recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymmetric encryption

A

aka Public/Private-key encryption and private-key encryption.

Uses two paired encryption algorithms to encrypt and decrypt the text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly