Search Header Logo

AIS51313 C1 Review

Authored by Marvin Soriano

Other

University

Used 57+ times

AIS51313 C1 Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the BEST way to minimize unauthorized access to unattended end-user PC systems?

Enforce use of a password-protected screen saver

Implement proximity-based authentication system

Terminate user session at predefined intervals

Adjust power management settings so the monitor screen is blank

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The implementation of which of the following would MOST effectively prevent unauthorized access to a system administration account on a web server?

Host intrusion detection software installed on the server

Password expiration and lockout policy

Password complexity rules

Two-factor authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A new business application has been designed in a large, complex organization and the business owner has requested that the various reports be viewed on a “need to know” basis. Which of the following access control methods would be the BEST method to achieve this requirement?

Mandatory

Role-based

Discretionary

Single sign-on

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an effective preventive control to ensure that a database administrator (DBA) complies with the custodianship of the enterprise’s data?

Exception reports

Segregation of duties

Review of access logs and activities

Management supervision

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee has received a digital photo frame as an gift and has connected it to his/her work PC to transfer digital photos. The PRIMARY risk that this scenario introduces is that:

the photo frame storage media could be used to steal corporate data.

the drivers for the photo frame may be incompatible and crash the user’s PC.

the employee may bring inappropriate photographs into the office.

the photo frame could be infected with malware.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An organization discovers that the computer of the chief financial officer has been infected with malware that includes a keystroke logger and a rootkit. The FIRST action to take would be to:

Contact the appropriate law enforcement authorities to begin an investigation.

Immediately ensure that no additional data are compromised.

Disconnect the PC from the network.

Update the antivirus signature on the pc to ensure that the malware or virus is detected and removed.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The IS auditor is reviewing Findings from a prior IS audit of a hospital. One finding indicates that the organization was using email to communicate sensitive patient issues.The IT manager indicates that to address this finding, the organization has implemented digital signatures for all email users. What should the IS auditor’s response be?

Digital signatures are not adequate to protect confidentiality

Digital signatures are adequate to protect confidentiality

The IS auditor should gather more information about the specific implementation.

The IS auditor should recommend implementation of digital watermarking for secure email.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?