Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 13
Quiz 6: Information Systems Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 81
Multiple Choice
A form of sabotage in which very large numbers of requests flood a Web server within a short time interval is known as a
Question 82
Short Answer
________ involves running multiple operating systems or multiple copies of the same operating system on the same machine.
Question 83
Short Answer
Most financial institutions use ________ ________ layer encryption to communicate with their clients through Web browsers.
Question 84
Multiple Choice
A defrauder substitutes his own version of a company's master file for the real one.This method of computer fraud is known as
Question 85
Short Answer
GASB statement number ________ requires utility companies to maintain business continuity plans.
Question 86
Short Answer
In virtualization,the individual operating system instances run under the control of a "master program" called a(n)________.
Question 87
Multiple Choice
Information security is an international problem.Which countries below have set criminal penalties of up to 10 years for fraudulent use of computer services or the intentional changing of a data processing record with the intent of enrichment?
Question 88
Multiple Choice
A weakness in an information security system is
Question 89
Multiple Choice
An intruder who intercepts legitimate information and replaces it with fraudulent information is known as a
Question 90
Multiple Choice
In an information security system,security measures focus on
Question 91
Multiple Choice
When the qualitative approach to risk assessment is used,costs might be estimated using
Question 92
Multiple Choice
Which group of people listed below would not pose a high degree of threat to an organization's information system?
Question 93
Multiple Choice
Sometimes computer programs are used to commit acts of sabotage.A destructive program masquerading as a legitimate one is called a
Question 94
Multiple Choice
The most important personnel policy and practice regarding information systems security is that
Question 95
Multiple Choice
The method used in most cases of computer fraud is
Question 96
Short Answer
Within the health-care sector the ________ ________ Portability and Accountability Act requires that health-care providers,insurance companies,and payment clearinghouses adopt standardized processes for electronic payments and claims.