Filters
Question type

Study Flashcards

Biometric devises use unique physical characteristics to identify users.The most common method used is retina scans.

Correct Answer

verifed

verified

To increase the effectiveness of login restrictions, passwords must be unique for each user.

Correct Answer

verifed

verified

Which programmed input validation makes sure that a value was entered in all of the critical fields?


A) Completeness check
B) Validity check
C) Reasonableness check
D) Field check

Correct Answer

verifed

verified

Companies who provide mobile devices for employees, normally has a policy that allows the company's IT professional to remove company data and applications from the mobile device.This process is referred to as:


A) Cloud exchange
B) Operations removal
C) Data integrity
D) Remove wipe

Correct Answer

verifed

verified

This should be established for every authorized user and determines each user's access level to hardware, software, and data according to the individual's job responsibilities.


A) User profile
B) User password
C) User ID
D) User log

Correct Answer

verifed

verified

The responsibility of management to safeguard assets and funds entrusted to them by the owners of an organization is referred to as:


A) Stewardship Responsibility
B) IT System Controls
C) Application Controls
D) Internal Controls

Correct Answer

verifed

verified

To the extent possible, IT systems should be installed in locations away from any location likely to be affected by natural disasters.

Correct Answer

verifed

verified

This type of input validation check assesses the critical fields in an input screen to make sure that a value is in those fields.


A) Field Check
B) Completeness Check
C) Range Check
D) Limit Check

Correct Answer

verifed

verified

To avoid the risks associated with a public cloud, many companies establish their own computing cloud structure.The cloud is developed, owned, maintained, and used by the user company.This cloud is referred to as:


A) Company cloud
B) User cloud
C) Private cloud
D) Internal cloud

Correct Answer

verifed

verified

A software system that manages the interface between many users and the database is called:


A) Database security system
B) Database management system
C) Database binary monetary system
D) Database assessment

Correct Answer

verifed

verified

Which programmed input validation check determines whether the appropriate type of data, either alphabetic or numeric, was entered?


A) Completeness check
B) Validity check
C) Reasonableness check
D) Field check

Correct Answer

verifed

verified

The risk of an unauthorized user gaining access is likely to be a risk for which of the following areas?


A) Telecommuting workers
B) Internet
C) Wireless networks
D) All of the above

Correct Answer

verifed

verified

The most popular type of type of unauthorized access is probably by a person known to the organization.

Correct Answer

verifed

verified

AICPA Trust Principles describe five categories of IT risks and controls.Which of these five categories would be described by the statement, "The system is protected against unauthorized access"?


A) Security
B) Confidentiality
C) Processing integrity
D) Availability

Correct Answer

verifed

verified

The use of passwords to allow only authorized users to log into an IT system is an example of an application control.

Correct Answer

verifed

verified

One of the sources of risk exposure related to telecommuting workers is that the company's network equipment and cabling becomes an entry point for hackers and unauthorized users.

Correct Answer

verifed

verified

It is necessary for students and accountants to understand the types of threats that may affect an accounting system, so that the threats can be avoided.

Correct Answer

verifed

verified

There are a number of methods described that are intended to limit log-ins exclusively to authorized users.The only method that is foolproof is the biometric devices.

Correct Answer

verifed

verified

The workstations and the network cabling and connections represent spots were an intruder could tap into the network for unauthorized access.

Correct Answer

verifed

verified

Telecommuting workers cause two sources of risk exposures for their organizations - the network equipment and cabling in addition to the teleworker's computer - with only "entry-point" being teleworker's computer.

Correct Answer

verifed

verified

Showing 61 - 80 of 164

Related Exams

Show Answer