ACC 564 Quiz 2 – Strayer New

ACC 564 Week 5 Quiz 2 Chapter 6 Through 9

Chapter 6   Computer Fraud and Abuse Techniques


1) Wally Hewitt maintains an online brokerage account. In early March, Wally received an email from the firm that explained that there had been a computer error and that provided a phone number so that Wally could verify his customer information. When he called, a recording asked that he enter the code from the email, his account number, and his social security number. After he did so, he was told that he would be connected with a customer service representative, but the connection was terminated. He contacted the brokerage company and was informed that they had not sent the email. Wally was a victim of

A) Bluesnarfing.

B) splogging.

C) vishing.

D) typosquatting.


2) When a computer criminal gains access to a system by searching records or the trash of the target company, this is referred to as

A) data diddling.

B) dumpster diving.

C) eavesdropping.

D) piggybacking...........................................................


Chapter 7   Control and Accounting Information Systems


1) What is one reason why AIS threats are increasing?

A) LANs and client/server systems are easier to control than centralized, mainframe systems.

B) Many companies do not realize that data security is crucial to their survival.

C) Computer control problems are often overestimated and overly emphasized by management.

D) Many companies believe that protecting information is a strategic requirement.



2) Which of the following is not one of the risk responses identified in the COSO Enterprise Risk Management Framework?

A) Monitoring

B) Avoidance

C) Acceptance

D) Sharing




Chapter 8   Information Systems Controls for System ReliabilityPart 1: Information Security


1) The Trust Services Framework reliability principle that states that users must be able to enter, update, and retrieve data during agreed-upon times is known as

A) availability.

B) security.

C) maintainability.

D) integrity.


2) Which of the following is not a useful control procedure to control access to system outputs?

A) Allowing visitors to move through the building without supervision

B) Coding reports to reflect their importance

C) Requiring employees to log out of applications when leaving their desk

D) Restricting access to rooms with printers.......................................................

Chapter 9   Information Systems Controls for Systems ReliabilityPart 2: Confidentiality and Privacy


1) Concerning virtual private networks (VPN), which of the following is not true?

A) VPNs provide the functionality of a privately owned network using the Internet.

B) Using VPN software to encrypt information while it is in transit over the Internet in effect creates private communication channels, often referred to as tunnels, which are accessible only to those parties possessing the appropriate encryption and decryption keys.

C) The cost of the VPN software is much less than the cost of leasing or buying the infrastructure (telephone lines, satellite links, communications equipment, etc.) needed to create a privately owned secure communications network.

D) It is more expensive to reconfigure VPNs to include new sites than it is to add or remove the corresponding physical connections in a privately owned network.



2) Which of the following is not associated with asymmetric encryption?

A) No need for key exchange

B) Public keys

C) Private keys

D) Speed

  • Item #: ACC564Q2

ACC 564 Quiz 2 – Strayer New

Price: $15.00
* Marked fields are required.
Qty: *
Reviews (0) Write a Review
No Reviews. Write a Review