ACC/564 ACC564 ACC 564 WEEK 5 QUIZ 2
- strayer university / ACC 564
- 18 Nov 2017
- Price: $10
- Other / Other
ACC 564 WEEK 5 QUIZ 2
Question 1
The call to tech support was fairly routine. A first-time computer user had purchased a brand new PC two months ago and it was now operating much more slowly and sluggishly than it had at first. Had he been accessing the Internet? Yes. Had he installed any "free" software? Yes. The problem is likely to be a(an) |
|||||||
|
- Question 2
Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by |
|||||||
|
- Question 3
The unauthorized use of special system programs to bypass regular system controls and perform illegal act is called |
|||||||
|
- Question 4
A fraud technique that slices off tiny amounts from many projects is called the ________ technique. |
|||||||
|
- Question 5
The unauthorized copying of company data is known as |
|||||||
|
- Question 6
According to the ERM, high level goals that are aligned with and support the company's mission are |
|||||||
|
- Question 7
The SEC and FASB are best described as external influences that directly affect an organization's |
|||||||
|
- Question 8
The definition of the lines of authority and responsibility and the overall framework for planning, directing, and controlling is laid out by the |
|||||||
|
- Question 9
The primary purpose of the Foreign Corrupt Practices Act of 1977 was |
|||||||
|
- Question 10
The risk that remains after management implements internal controls is |
|||||||
|
- Question 11
The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as |
|||||||
|
- Question 12
According to the Trust Services Framework, the reliability principle of integrity is achieved when the system produces data that |
|||||||
|
- Question 13
The ________ disseminates information about fraud, errors, breaches and other improper system uses and their consequences. |
|||||||
|
- Question 14
In 2007, a major U.S. financial institution hired a security firm to attempt to compromise its computer network. A week later, the firm reported that it had successfully entered the system without apparent detection and presented an analysis of the vulnerabilities that had been found. This is an example of a |
|||||||
|
- Question 15
Which of the following is an example of a preventive control? |
|||||||
|
- Question 16
Which of the following is not one of the three important factors determining the strength of any encryption system? |
|||||||
|
- Question 17
An electronic document that certifies the identity of the owner of a particular public key. |
|||||||
|
- Question 18
These are used to create digital signatures. |
|||||||
|
- Question 19
Encryption has a remarkably long and varied history. The invention of writing was apparently soon followed by a desire to conceal messages. One of the earliest methods, attributed to an ancient Roman emperor, was the simple substitution of numbers for letters, for example A = 1, B = 2, etc. This is an example of |
|||||||
|
- Question 20
Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information? |
|||||||
|