Test 2 Flashcards

1
Q
Able was chatting online with Baker. "I can't believe how lame some people are! :) I can get into any system by checking out the company website to see how user names are defined and who is on the employee directory. Then, all it takes is brute force to find the password." Able is a \_\_\_\_\_, and the fraud he is describing is \_\_\_\_\_.  
A. hacker; social engineering
B. phreaker; dumpster diving
C. hacker; password cracking
D. phreaker; the salami technique
A

C. hacker; password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Computers that are part of a botnet are controlled by a bot herder are referred to as 
A. posers
B. zombies
C. botsquats
D. evil twins
A

B. zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Josie Jerkwater, a first time computer user, purchased a brand new PC two months ago and it was now operating much more slowly an sluggishly. Since purchasing the computer, she had been accessing the Internet and had installed a variety of free software.  The problem is most likely to be
A. a zero-day attack
B. a virus
C. a spoof
D. bluesnarfing
A

B. a virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following would b least effective to reduce exposure to a computer virus?
A. Only transfer files between employees with USB flash drives
B. Install and frequently update antivirus software
C. Install all new software on a stand-alone computer for until it is tested.
D. Do not open email attachments from unknown senders

A

A. Only transfer files between employees with USB flash drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Developers of computer systems often include a sure name and password that is hidden in the system, just in case they need to get into the system and correct problems in the future. This is referred to as a 
A. Trojan horse
B. key logger
C. spoof
D. back door
A

D. back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Narang direct sales is a telemarketing firm that operates out of India. The turnover rate among employees is quite high.  Recently, the information technology manager discovered that an unknown employee had used Bluetooth-enabled mobile phone to their credit card information. Narang Direct Sales was a victim of 
A. Bluesnarffing
B. splogging
C. vishing
D. typosquatting
A

A. Bluesnarffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A control procedure designed so that the employee that records cash received from customers does not have access to the cash itself is an example of a 
A. preventive control
B. detective control
C. corrective control
D. authorization control
A

A. preventive control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Duplicate checking of calculations is an example of a \_\_\_\_\_ control, and procedures to resubmit rejected transactions are an example of a \_\_\_\_control
A. corrective; detective
B. detective; corrective
C. preventive; corrective
D. detective; preventive
A

B. detective; corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The largest differences between the COSO Integrated Control (IC) framework and the COSO Enterprise Risk Management (ERM) framework is
A) IC is controls-based, while the ERM is risk-based
B) IC is risk-based, while ERM is controls-based
C) IC is required, while ERM is optional
D) IC is more applicable to international accounting standards, while ERM is more applicable to generally accepted accounting principles

A

A) IC is controls-based, while the ERM is risk-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The audit committee of the board of directors
A. is usually chaired by the CFO
B. conducts testing of controls on behalf of the external auditors
C. provides a check and balance on management
D. does all of the above.

A

C. provides a check and balance on management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Personnel policies such as background checks, mandatory vacations, and rotation of duties tend to deter
A. unintentional errors
B. employee fraud or embezzlement
C. fraud by outsiders
D. disgruntled employees
A

B. employee fraud or embezzlement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The first step of the risk assessment process is generally to
A. identify controls to reduce all risk to zero
B. estimate the exposure from negative events
C. identify the threats that the company currently faces
D. estimate the risk probability of negative events occurring

A

C. identify the threats that the company currently faces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

According to the COSO Enterprise Risk Management Framework, the risk assessment process incorporates all of the following components except
A. reporting potential risks to auditors
B. identifying events that could impact the enterprise
C. evaluating the impact of potential events on achievement of objectives
D. establishing objectives for the enterprise

A

A. reporting potential risks to auditors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Upon getting into your new car, you suddenly became worried that you might become injured in an auto accident. You decided to buckle your seatbelt in response. You chose to \_\_\_\_\_\_ the risk of being injured in an auto accident
A. reduce
B. share
C. avoid
D. accept
A

A. reduce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Petty cash is disbursed by the Manuela Luisina in the Cashier's Office. Manuela also maintains records of disbursements, places requests to the Finance Department to replace expended funds, and periodically reconciles the petty cash balance. This represents\_\_\_\_\_\_ segregation of duties. 
A. ideal
B. effective
C. ineffective
D. limited
A

C. ineffective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
If the time an attacker takes to break through the organization's preventative controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack, then security is
A. effective
B. ineffective
C. overdone
D. undermanaged
A

A. effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Identify the primary means of protecting data stored in a cloud form unauthorized access.
A. authentication
B. authorization
C. virtualization
D. securitization
A

A. authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Identify the statement below which is not a useful control procedure regarding access to system outputs
A. restricting access to rooms with printers
B. coding reports to reflect their importance
C. allowing visitors to move through the building without supervision
D. requiring employees to log out of applications when leaving their desk

A

C. allowing visitors to move through the building without supervision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Restricting access of users to specific portions of the system as well as specific tasks, is an example of 
A. authentication
B. authorization
C. identification
D. threat monitoring
A

B. authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Multi-factor authentication
A. involves the use of two or more basic authentications methods
B. is a table specifying with portions of the systems users are permitted to access
C. provides weaker authentication than the use of effective passwords
D. requires the use of more than one effective password

A

A. involves the use of two or more basic authentications methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
The process that allows a firewall to be more effective by examining the data in the body of an IP packet, instead of just the header, is know as
A. deep packet inspection
B. stateful packet filtering
C. static packet filtering
D. an intrusion prevention system
A

A. deep packet inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
In 2007, a major US financial institution hired a security firm to attempt to compromise its computer network. A week later, the firm reported that it had successfully entered the system without apparent detection and presented an analysis of the vulnerabilities that had been found.  This is an example of a 
A. preventive control
B. detective control
C. corrective control
D. standard control
A

B. detective control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
Identify the type of information below that is least likely to be considered "sensitive" by an organization
A. financial statements
B. legal documents
C. strategic plans 
D. product cost information
A

C. strategic plans

24
Q
If an organization asks you to disclose your social security number, yet fails to properly dispose of your private information once it has fulfilled its purpose, the organization has likely violated which of the Generally Accepted Privacy Principles?
A. management
B. notice
C. choice and consent
D. use and retention
A

D. use and retention

25
Q
If an organization asks you to disclose your date of birth an d your address, but refuses to let you review or correct the information you provided, the organization has likely violated which of the GAAP?
A. collection
B. access
C. security
D. choice and consent
A

B. access

26
Q
The system and processes used to issue and manage asymmetric keys and digital certificates are known as 
A. asymmetric encryption
B. certificate authority
C. digital signature
D. public key infrastructure
A

D. public key infrastructure

27
Q

Identify one weakness of encryption below
A. encrypted packets cannot be examined by a firewall
B. encryption provides for both authentication and non-repudiation
C. Encryption protects an privacy of information during transmission
D. Encryption protects the confidentiality of information while in storage

A

A. encrypted packets cannot be examined by a firewall

28
Q
These are used to create digital signatures
A. asymmetric encryption
B. hashing and packet filtering
C. packet filtering and encryption
D. symmetric encryption and hashing
A

A. asymmetric encryption

29
Q
A process that takes plaintext of any length and transforms it into a short code
A. asymmetric encryption
B.encryption
C. hashing
D. symmetric encryption
A

C. hashing

30
Q
One way to circumvent the counterfeiting of public keys is by using
A. a digital certificate
B. digital authority
C. encryption
D. cryptography
A

A. a digital certificate

31
Q

Definition of symmetric encryption systems

A

encryption systems that use the same key both to encrypt and to decrypt

32
Q

Advantages of symmetric encryption

A

speed-much faster because there is only one key

33
Q

Disadvantages of symmetric encyption

A
  1. Requires separate key for everyone who wishes to communicate
  2. Must find a secure way to share the key with other party
34
Q

Asymmetric encryption

A

encryption systems that use two keys (one public, the other private); either key can encrypt, but only the other matching key can decrypt

35
Q

advantages of asymmetric encryption

A
  1. Everyone can use your public key to communicate with you.
  2. No need to store keys for each party with whom you communicate
  3. Can be used to create legally binding digital signatures
36
Q

disadvantages of asymmetric encryption

A
  1. speed-much slower because there are two keys

2. Requires public key infrastructure (PKI) to validate ownership of public keys

37
Q

Five components of COSO Internal Control Framework

A
  1. Control Environment
  2. Risk Assessment
  3. Information and Communication
  4. Control Activities
  5. Monitoring
38
Q

techniques or psychological tricks used to get people to comply with the perpetrator’s wishes in order to gain physical or logical access to a building, computer, server, or network for the purpose of obtaining confidential data

A

Social engineering

39
Q

illegally obtaining confidential information about an individual such as social security number or a bank account or credit card in order to pretend to be them, usually for financial gain

A

identity theft

40
Q

voice phishing; it is like phishing except that the victim enters confidential data by phone

A

vishing

41
Q

redirecting website traffic to a spoofed website to obtain confidential information

A

pharming

42
Q

setting up similarly named websites so that users making typographical errors when entering a website name are sent to an invalid site.

A

typosquatting

43
Q

stealing tiny slices of money from many different accounts

A

salami technique

44
Q

unwanted release or copying of data or information

A

data leakage

45
Q

linking up with or entering a system with or via a legitimate use who is authenticated to use the system

A

piggybacking

46
Q

a computer attack in which the attacker sends so many email bombs or web page requests, often from randomly generated false addresses, that the Internet service provider’s email server or the web server is overloaded and shuts down.

A

denial-of-service

47
Q

the practice driving around looking for unprotected hoe or corporate wireless networks.

A

war driving

48
Q

an encrypted tunnel used to transmit information securely across the Internet

A

Virtual Private Network (VPN)

49
Q

a has encrypted with the creator’s private key

A

digital signature

50
Q

used to store an entity’s public key, often found on web sites

A

digital certificate

51
Q

a document or file that must be decrypted to be read

A

ciphertext

52
Q

unwanted email

A

spam

53
Q

an encryption process that uses the same key to both encrypt an decrypt

A

symmetric encryption

54
Q

the inability to unilaterally deny having created a document or file or having agreed to perform a transaction

A

non-repudiation

55
Q

a document or file that can be read by anyone who accesses it

A

plaintext

56
Q

a process that transforms a document or file into a fixed length string of data

A

hashing