Question: B ) Avoid emotionalism C ) Keep communication lines open D ) Keep the system simple 6 9 What type of software secretly collects personal
B Avoid emotionalism
C Keep communication lines open
D Keep the system simple
What type of software secretly collects personal information about users and sends it to someone else without the user's permission?
A Spyware
B Torpedo software
C Rootkit
D Malware
A set of instructions to increase a programmer's pay rate by is hidden inside an authorized program. It changes and updates the payroll file. What is this computer fraud technique called?
A Virus
B Worm
C Trojan horse
D Trap door
Which computer fraud technique involves a set of instructions hidden inside a calendar utility that copies itself each time the utility is enabled until memory is filled and the system crashes?
A Logic bomb
B Trap door
C Virus
D Trojan horse
Techniques used to obtain confidential information, often by tricking people, are referred to as what?
A Pretexting
B Posing
C Identity theft
D Social engineering
Which of the following statements is true?
A Ebusiness is a subset of ecommerce
B Ecommerce is a subset of ebusiness
C Ebusiness and ecommerce are the same thing
D Ebusiness and ecommerce are not related
Which of the following statements best describes the risks of Enterprise Resource Planning ERP systems?
A The risks of implementing and operating ERP systems are nearly identical to the risks of implementing and operating IT systems.
B The risks of operating and implementing ERP systems are greater than the risks of implementing and operating IT systems, due to the scope, size, and complexity of ERP systems.
C The risks of implementing ERP systems are greater than the risks of implementing IT systems, but the operating risks are nearly identical.
D The risks of operating ERP systems are greater than the risks of operating IT systems, but the implementation risks are nearly identical.
Management of an Internet retail company is concerned about the possibility of computer data eavesdropping and wiretapping and wants to maintain the confidentiality of its information as it is transmitted. The company should make use of:
A Data encryption
B Input controls
C Redundant servers
D Password codes
AICPA Trust Services Principles describe five categories of IT risks and controls. Which of these five categories would best be described by the statement, "The system is protected against unauthorized access"?
A Security
B Processing integrity
C Confidentiality
D Availability
Which of the following is not a control intended to authenticate users?
A User login
B Security token
C Encryption
D Biometric devices
Which of the following is not criticisms of consequentialist theories in Ethics?
A The rights of individuals are not considered
B It does not consider the minority question
C It is not clear whose judgment is the consequence examined
D Costbenefit analysis is not applicable as a basic form of the theories
Which of the following statements about the control environment is false?
A Management's attitudes toward internal control and ethical behavior have little impact on employee beliefs or actions.
B An overly complex or unclear organizational structure may be indicative of problems that are more serious.
C A written policy and procedures manual is an important tool for assigning authority and responsibility.
D Supervision is especially important in organizations that cannot afford elaborate responsibility reporting or are too small to have an adequate separation of duties.
Which of these is not one of the three major types of controls?
A Preventive
B Corrective
C Detective
D Objective
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
