
AIS51313 C1 Review
Authored by Marvin Soriano
Other
University
Used 57+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is the BEST way to minimize unauthorized access to unattended end-user PC systems?
Enforce use of a password-protected screen saver
Implement proximity-based authentication system
Terminate user session at predefined intervals
Adjust power management settings so the monitor screen is blank
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The implementation of which of the following would MOST effectively prevent unauthorized access to a system administration account on a web server?
Host intrusion detection software installed on the server
Password expiration and lockout policy
Password complexity rules
Two-factor authentication
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A new business application has been designed in a large, complex organization and the business owner has requested that the various reports be viewed on a “need to know” basis. Which of the following access control methods would be the BEST method to achieve this requirement?
Mandatory
Role-based
Discretionary
Single sign-on
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is an effective preventive control to ensure that a database administrator (DBA) complies with the custodianship of the enterprise’s data?
Exception reports
Segregation of duties
Review of access logs and activities
Management supervision
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An employee has received a digital photo frame as an gift and has connected it to his/her work PC to transfer digital photos. The PRIMARY risk that this scenario introduces is that:
the photo frame storage media could be used to steal corporate data.
the drivers for the photo frame may be incompatible and crash the user’s PC.
the employee may bring inappropriate photographs into the office.
the photo frame could be infected with malware.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An organization discovers that the computer of the chief financial officer has been infected with malware that includes a keystroke logger and a rootkit. The FIRST action to take would be to:
Contact the appropriate law enforcement authorities to begin an investigation.
Immediately ensure that no additional data are compromised.
Disconnect the PC from the network.
Update the antivirus signature on the pc to ensure that the malware or virus is detected and removed.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The IS auditor is reviewing Findings from a prior IS audit of a hospital. One finding indicates that the organization was using email to communicate sensitive patient issues.The IT manager indicates that to address this finding, the organization has implemented digital signatures for all email users. What should the IS auditor’s response be?
Digital signatures are not adequate to protect confidentiality
Digital signatures are adequate to protect confidentiality
The IS auditor should gather more information about the specific implementation.
The IS auditor should recommend implementation of digital watermarking for secure email.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
25 questions
Astro Quiz 2025
Quiz
•
University
25 questions
James’s Quiz
Quiz
•
1st Grade - University
25 questions
2025 North Dakota Parliamentary Procedure Exam State Exam
Quiz
•
9th Grade - University
26 questions
Professional Sellling Unit 5 Practice Exam
Quiz
•
University
26 questions
Exam 7-9
Quiz
•
University
28 questions
Chapter 1-5 Speech craft
Quiz
•
University
26 questions
Food allergies
Quiz
•
3rd Grade - Professio...
25 questions
Acct. Test Bank #4 Adjusting Entries
Quiz
•
9th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Other
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
5 questions
Examining Theme
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University