SU 15
A digital signature is used primarily to determine that a message is
- Unaltered in transmission.
Which of the following classifications of security controls includes smoke detectors,
generators, security guards, and ID badges?
- Physical
6 Ways to Show Appreciation for Your Child's Teacher
0:03
/
0:54
Which of the following statements best characterizes the function of a physical access
control?
- Separates unauthorized individuals from computer resources.
Which of the following is an advantage of a computer-based system for transaction
processing over a manual system? A computer-based system
- Will be more efficient at producing financial statements.
A company's web server has been overwhelmed with a sudden surge of false requests that
caused the server to crash. The company has most likely been the target of
- A denial of service attack.
If a control total were to be computed on each of the following data items, which would best
be identified as a hash total for a payroll computer application?
- Department numbers
Which of the following is considered an application input control?
- Edit check.
Which of the following types of control plans is particular to a specific process or subsystem,
rather than related to the timing of its occurrence?
- Application.
Which of the following is a false statement about the COBIT 2019 framework?
, - Governance and management activities and structures can be combined to support a
holistic approach.
An entity doing business on the Internet most likely could use any of the following methods
to prevent unauthorized intruders from accessing proprietary information except
- Batch processing.
A customer's order was never filled because an order entry clerk transposed the customer
identification number while entering the sales transaction into the system. Which of the
following controls would most likely have detected the transposition?
- Validity check.
Which of the following statements presents an example of a general control for a
computerized system?
- Restricting access to the computer center by use of biometric devices.
Which of the following is a password security problem?
- Users are assigned passwords when accounts are created but do not change them.
A customer notified a company that the customer's account did not reflect the most recent
monthly payment. The company investigated the issue and determined that a clerk had
mistakenly applied the customer's payments to a different customer's account. Which of the
following controls would help to prevent such an error?
- Closed-loop verification.
Which of the following statements is correct regarding information technology (IT)
governance?
- A primary goal of IT governance is to balance risk versus return over IT and its processes.
An organization relied heavily on e-commerce for its transactions. Evidence of the
organization's security awareness manual would be an example of which of the following
types of controls?
- Preventive.
Which of the following errors most likely would be detected by batch financial totals?
- A transposition error on one employee's paycheck on a weekly payroll run.
A digital signature is used primarily to determine that a message is
- Unaltered in transmission.
Which of the following classifications of security controls includes smoke detectors,
generators, security guards, and ID badges?
- Physical
6 Ways to Show Appreciation for Your Child's Teacher
0:03
/
0:54
Which of the following statements best characterizes the function of a physical access
control?
- Separates unauthorized individuals from computer resources.
Which of the following is an advantage of a computer-based system for transaction
processing over a manual system? A computer-based system
- Will be more efficient at producing financial statements.
A company's web server has been overwhelmed with a sudden surge of false requests that
caused the server to crash. The company has most likely been the target of
- A denial of service attack.
If a control total were to be computed on each of the following data items, which would best
be identified as a hash total for a payroll computer application?
- Department numbers
Which of the following is considered an application input control?
- Edit check.
Which of the following types of control plans is particular to a specific process or subsystem,
rather than related to the timing of its occurrence?
- Application.
Which of the following is a false statement about the COBIT 2019 framework?
, - Governance and management activities and structures can be combined to support a
holistic approach.
An entity doing business on the Internet most likely could use any of the following methods
to prevent unauthorized intruders from accessing proprietary information except
- Batch processing.
A customer's order was never filled because an order entry clerk transposed the customer
identification number while entering the sales transaction into the system. Which of the
following controls would most likely have detected the transposition?
- Validity check.
Which of the following statements presents an example of a general control for a
computerized system?
- Restricting access to the computer center by use of biometric devices.
Which of the following is a password security problem?
- Users are assigned passwords when accounts are created but do not change them.
A customer notified a company that the customer's account did not reflect the most recent
monthly payment. The company investigated the issue and determined that a clerk had
mistakenly applied the customer's payments to a different customer's account. Which of the
following controls would help to prevent such an error?
- Closed-loop verification.
Which of the following statements is correct regarding information technology (IT)
governance?
- A primary goal of IT governance is to balance risk versus return over IT and its processes.
An organization relied heavily on e-commerce for its transactions. Evidence of the
organization's security awareness manual would be an example of which of the following
types of controls?
- Preventive.
Which of the following errors most likely would be detected by batch financial totals?
- A transposition error on one employee's paycheck on a weekly payroll run.