Question 1
A software program that allows access to a system without going through the normal logon procedures is called back door.
True
False
Question 2
A software program that replicates itself in areas of idle memory until the system fails is called a trojan horse.
True
False
Response Feedback:
It is called a worm.
Question 3
The grandfather-parent-child (aka grandfather-father-son) backup technique is most appropriate for sequential batch systems.
True
False
Question 4
Encryption is the conversion of data into a secret code for storage in databases and transmission over networks. For transmissions, the message is coded at the sending end using an encryption algorithm and is decoded at the receiving end.
True
False
Question 5
Which of the following is not a form of contra password security behavior?
Using a simplistic password.
Failing to change your password on a frequent basis.
Not backing up files are according to policy.
Forgetting your password.
Writing your password down and displaying it so others can see it.
Question 6
In an electronic data interchange environment, customers routinely access the vendor’s price list.
True
False
Question 7
In an electronic data interchange (EDI) environment, when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table, the auditor is testing the audit objective that authorized trading partners have access only to approved data.
True
False
Question 8
Audit objectives in the electronic data interchange (EDI) environment include all of the following except
all EDI transactions are authorized
unauthorized trading partners cannot gain access to database records
a complete audit trail of EDI transactions is maintained
backup procedures are in place and functioning properly
Question 9
In determining whether a system is adequately protected from attacks by computer viruses, all of the following policies are relevant except
the policy on the purchase of software only from reputable vendors
the policy that all vendor software upgrades are checked for viruses before they are implemented
the policy that current versions of antivirus software should be available to all users
the policy that permits users to take files home to work on them
Question 10
Which of the following is not an audit procedure for access privileges?
Review the organization’s policies regarding incompatible functions to insure that they promote reasonable security.
Review employee’s privileges to determine if their access rights are appropriate for their job.
Review data back up procedures to determine if they are adequate.
Review employee personnel records to determine whether privileged employees have a security check in compliance with company policy.
 
“WE’VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH Essayfount.com AND GET AN AMAZING DISCOUNT”
The post CIS430 Self Quiz appeared first on essayfount.


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"