Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 12
Quiz 8: Controls for Information Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Identify a party below who was involved with developing the Trust Services Framework.
Question 2
Multiple Choice
Identify one aspect of systems reliability that is not a source of concern with regards to a public cloud.
Question 3
Multiple Choice
There are "white hat" hackers and "black hat" hackers.Cowboy451 was one of the "black hat" hackers.He had researched an exploit and determined that he could penetrate the target system,download a file containing valuable data,and cover his tracks in eight minutes.Six minutes into the attack he was locked out of the system.Using the notation of the time-based model of security,which of the following must be true?
Question 4
Multiple Choice
The Trust Services Framework reliability principle that states that users must be able to enter,update,and retrieve data during agreed-upon times is known as
Question 5
Multiple Choice
Verifying the identity of the person or device attempting to access the system is an example of
Question 6
True/False
Cloud computing can potentially generate significant cost savings for an organization.
Question 7
Multiple Choice
Which of the following is not one of the essential criteria for successfully implementing each of the principles that contribute to systems reliability,as discussed in the Trust Services Framework?
Question 8
Multiple Choice
The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as
Question 9
Multiple Choice
Kuzman Jovan called a meeting of the top management at Jovan Capital Management.Number one on the agenda was computer system security."The risk of security breach incidents has become unacceptable," he said,and turned to the Chief Information Officer."What do you intend to do?" Which of the following is the best answer?
Question 10
True/False
Cloud computing is generally more secure than traditional computing.
Question 11
Multiple Choice
The Trust Services Framework reliability principle that states personal information should be protected from unauthorized disclosure is known as
Question 12
Multiple Choice
Information security procedures protect information integrity by
Question 13
Multiple Choice
Virtualization refers to the ability of
Question 14
Multiple Choice
If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack,then security is