What criteria contribute to systems reliability? ...

90.2K

Verified Solution

Question

Accounting

  1. What criteria contribute to systems reliability?

A.

Developing and documenting policies

B.

Effectively communicating policies to all authorized users

C.

Designing appropriate control procedures

D.

Monitoring the system and taking corrective action

E.

All of the above

F.

None of the above.

10 points

QUESTION 2

  1. Compliance with the Sarbanes Oxley Act of 2002 requires

A.

The CEO to certify that he/she evaluates the effectiveness of internal controls.

B.

The CFO to certify that he/she evaluates the effectiveness of internal controls.

C.

The CEO and CFO must certify that they have evaluated the effectiveness of internal controls.

D.

Neither the CEO nor CFO are required to certify internal control effectiveness.

10 points

QUESTION 3

  1. What type of security controls are authorization controls?

A.

Corrective controls

B.

Detective controls

C.

Internal controls

D.

Preventive controls

10 points

QUESTION 4

  1. Which of the following devices should NOT be placed in the demilitarized zone (DMZ)?

A.

Mail server

B.

Remote access server

C.

Web server

D.

Sales department server

10 points

QUESTION 5

  1. The time based model of security does not include which factor to evaluate the effectiveness of an entity's security controls

A.

The time it takes to evaluate the financial consequences from an attack.

B.

The time it takes to respond to an attack.

C.

The time it takes to determine that an attack is in progress.

D.

The time it takes an attacker to break through the entity's preventative controls.

10 points

QUESTION 6

  1. Defense in depth utilizes what techniques to assure security?

A.

Employs multiple layers of controls

B.

Provides redundancy of controls

C.

Utilizes overlapping and complementary controls

D.

All of the above

E.

None of the above

10 points

QUESTION 7

  1. Which of the following statements is true regarding authorization controls?

A.

Permits access to all aspects of an entity's operating system

B.

Permits the user to engage in all operating actions

C.

Permits the user unlimited ability to change information

D.

All of the above.

E.

None of the above.

10 points

QUESTION 8

  1. Which of the following items are considered detective controls?

A.

Log analysis

B.

Intrusion detection systems

C.

Authentication controls

D.

Both A and B

E.

None of the above

10 points

QUESTION 9

  1. Which of the following is an example of a corrective control?

A.

Log analysis

B.

Encryption

C.

Authentication controls

D.

Patch management

10 points

QUESTION 10

  1. Which type of network filtering screens individual IP packets based solely on its contents?

A.

Static packet filtering

B.

Stateful packet filtering

C.

Deep packet filtering

D.

None of the above

Answer & Explanation Solved by verified expert
Get Answers to Unlimited Questions

Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!

Membership Benefits:
  • Unlimited Question Access with detailed Answers
  • Zin AI - 3 Million Words
  • 10 Dall-E 3 Images
  • 20 Plot Generations
  • Conversation with Dialogue Memory
  • No Ads, Ever!
  • Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!
Become a Member

Other questions asked by students