CIS430 Unit 7 Self Quiz C16

CIS430 Unit 7 Self Quiz C16

Question 1

A software program that allows access to a system without going through the normal logon procedures is called back door.

True

False

Question 2

A software program that replicates itself in areas of idle memory until the system fails is called a trojan horse.

True

False

Response Feedback:

It is called a worm.

Question 3

The grandfather-parent-child (aka grandfather-father-son) backup technique is most appropriate for sequential batch systems.

True

False

Question 4

Encryption is the conversion of data into a secret code for storage in databases and transmission over networks. For transmissions, the message is coded at the sending end using an encryption algorithm and is decoded at the receiving end.

True

False

Question 5

Which of the following is not a form of contra password security behavior?

Using a simplistic password.

Failing to change your password on a frequent basis.

Not backing up files are according to policy.

Forgetting your password.

Writing your password down and displaying it so others can see it.

Question 6

In an electronic data interchange environment, customers routinely access the vendor’s price list.

True

False

Question 7

In an electronic data interchange (EDI) environment, when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table, the auditor is testing the audit objective that authorized trading partners have access only to approved data.

True

False

Question 8

Audit objectives in the electronic data interchange (EDI) environment include all of the following except

all EDI transactions are authorized

unauthorized trading partners cannot gain access to database records

a complete audit trail of EDI transactions is maintained

backup procedures are in place and functioning properly

Question 9

In determining whether a system is adequately protected from attacks by computer viruses, all of the following policies are relevant except

the policy on the purchase of software only from reputable vendors

the policy that all vendor software upgrades are checked for viruses before they are implemented

the policy that current versions of antivirus software should be available to all users

the policy that permits users to take files home to work on them

Question 10

Which of the following is not an audit procedure for access privileges?

Review the organization’s policies regarding incompatible functions to insure that they promote reasonable security.

Review employee’s privileges to determine if their access rights are appropriate for their job.

Review data back up procedures to determine if they are adequate.

Review employee personnel records to determine whether privileged employees have a security check in compliance with company policy.

"96% of our customers have reported a 90% and above score. You might want to place an order with us."

Essay Writing Service
Affordable prices

You might be focused on looking for a cheap essay writing service instead of searching for the perfect combination of quality and affordable rates. You need to be aware that a cheap essay does not mean a good essay, as qualified authors estimate their knowledge realistically. At the same time, it is all about balance. We are proud to offer rates among the best on the market and believe every student must have access to effective writing assistance for a cost that he or she finds affordable.

Caring support 24/7

If you need a cheap paper writing service, note that we combine affordable rates with excellent customer support. Our experienced support managers professionally resolve issues that might appear during your collaboration with our service. Apply to them with questions about orders, rates, payments, and more. Contact our managers via our website or email.

Non-plagiarized papers

“Please, write my paper, making it 100% unique.” We understand how vital it is for students to be sure their paper is original and written from scratch. To us, the reputation of a reliable service that offers non-plagiarized texts is vital. We stop collaborating with authors who get caught in plagiarism to avoid confusion. Besides, our customers’ satisfaction rate says it all.

© 2022 Homeworkcrew.com provides writing and research services for limited use only. All the materials from our website should be used with proper references and in accordance with Terms & Conditions.

Scroll to Top