
AIS51313 C1 Review
Authored by Marvin Soriano
Other
University
Used 57+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is the BEST way to minimize unauthorized access to unattended end-user PC systems?
Enforce use of a password-protected screen saver
Implement proximity-based authentication system
Terminate user session at predefined intervals
Adjust power management settings so the monitor screen is blank
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The implementation of which of the following would MOST effectively prevent unauthorized access to a system administration account on a web server?
Host intrusion detection software installed on the server
Password expiration and lockout policy
Password complexity rules
Two-factor authentication
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A new business application has been designed in a large, complex organization and the business owner has requested that the various reports be viewed on a “need to know” basis. Which of the following access control methods would be the BEST method to achieve this requirement?
Mandatory
Role-based
Discretionary
Single sign-on
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is an effective preventive control to ensure that a database administrator (DBA) complies with the custodianship of the enterprise’s data?
Exception reports
Segregation of duties
Review of access logs and activities
Management supervision
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An employee has received a digital photo frame as an gift and has connected it to his/her work PC to transfer digital photos. The PRIMARY risk that this scenario introduces is that:
the photo frame storage media could be used to steal corporate data.
the drivers for the photo frame may be incompatible and crash the user’s PC.
the employee may bring inappropriate photographs into the office.
the photo frame could be infected with malware.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An organization discovers that the computer of the chief financial officer has been infected with malware that includes a keystroke logger and a rootkit. The FIRST action to take would be to:
Contact the appropriate law enforcement authorities to begin an investigation.
Immediately ensure that no additional data are compromised.
Disconnect the PC from the network.
Update the antivirus signature on the pc to ensure that the malware or virus is detected and removed.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The IS auditor is reviewing Findings from a prior IS audit of a hospital. One finding indicates that the organization was using email to communicate sensitive patient issues.The IT manager indicates that to address this finding, the organization has implemented digital signatures for all email users. What should the IS auditor’s response be?
Digital signatures are not adequate to protect confidentiality
Digital signatures are adequate to protect confidentiality
The IS auditor should gather more information about the specific implementation.
The IS auditor should recommend implementation of digital watermarking for secure email.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?