AIS51313 C1 Review

AIS51313 C1 Review

University

30 Qs

quiz-placeholder

Similar activities

TPBUSTECH MIDTERM EXAM

TPBUSTECH MIDTERM EXAM

University

35 Qs

CHAPTER 3 - INTERNAL CONRTOL SYSTEM (DIA 6A)

CHAPTER 3 - INTERNAL CONRTOL SYSTEM (DIA 6A)

University

30 Qs

(Part 1/3) Modules 3 – 5: Network Security

(Part 1/3) Modules 3 – 5: Network Security

University

25 Qs

MPP 3

MPP 3

University - Professional Development

30 Qs

Audit Pemerintah UTS

Audit Pemerintah UTS

University

25 Qs

UAS Pemeriksaan Manajemen

UAS Pemeriksaan Manajemen

University

30 Qs

CompTIA IT Fundamentals+ Ch. 08 - Networking Concepts

CompTIA IT Fundamentals+ Ch. 08 - Networking Concepts

University - Professional Development

30 Qs

Personal Decision Making/Banking  Quiz

Personal Decision Making/Banking Quiz

11th Grade - University

25 Qs

AIS51313 C1 Review

AIS51313 C1 Review

Assessment

Quiz

Other

University

Hard

Created by

Marvin Soriano

Used 48+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the BEST way to minimize unauthorized access to unattended end-user PC systems?

Enforce use of a password-protected screen saver

Implement proximity-based authentication system

Terminate user session at predefined intervals

Adjust power management settings so the monitor screen is blank

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The implementation of which of the following would MOST effectively prevent unauthorized access to a system administration account on a web server?

Host intrusion detection software installed on the server

Password expiration and lockout policy

Password complexity rules

Two-factor authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A new business application has been designed in a large, complex organization and the business owner has requested that the various reports be viewed on a “need to know” basis. Which of the following access control methods would be the BEST method to achieve this requirement?

Mandatory

Role-based

Discretionary

Single sign-on

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an effective preventive control to ensure that a database administrator (DBA) complies with the custodianship of the enterprise’s data?

Exception reports

Segregation of duties

Review of access logs and activities

Management supervision

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee has received a digital photo frame as an gift and has connected it to his/her work PC to transfer digital photos. The PRIMARY risk that this scenario introduces is that:

the photo frame storage media could be used to steal corporate data.

the drivers for the photo frame may be incompatible and crash the user’s PC.

the employee may bring inappropriate photographs into the office.

the photo frame could be infected with malware.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An organization discovers that the computer of the chief financial officer has been infected with malware that includes a keystroke logger and a rootkit. The FIRST action to take would be to:

Contact the appropriate law enforcement authorities to begin an investigation.

Immediately ensure that no additional data are compromised.

Disconnect the PC from the network.

Update the antivirus signature on the pc to ensure that the malware or virus is detected and removed.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The IS auditor is reviewing Findings from a prior IS audit of a hospital. One finding indicates that the organization was using email to communicate sensitive patient issues.The IT manager indicates that to address this finding, the organization has implemented digital signatures for all email users. What should the IS auditor’s response be?

Digital signatures are not adequate to protect confidentiality

Digital signatures are adequate to protect confidentiality

The IS auditor should gather more information about the specific implementation.

The IS auditor should recommend implementation of digital watermarking for secure email.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?