Question: B ) Avoid emotionalism C ) Keep communication lines open D ) Keep the system simple 6 9 What type of software secretly collects personal

B) Avoid emotionalism
C) Keep communication lines open
D) Keep the system simple
69 What type of software secretly collects personal information about users and sends it to someone else without the user's permission?
A) Spyware
B) Torpedo software
C) Rootkit
D) Malware
70 A set of instructions to increase a programmer's pay rate by 10% is hidden inside an authorized program. It changes and updates the payroll file. What is this computer fraud technique called?
A) Virus
B) Worm
C) Trojan horse
D) Trap door
71 Which computer fraud technique involves a set of instructions hidden inside a calendar utility that copies itself each time the utility is enabled until memory is filled and the system crashes?
A) Logic bomb
B) Trap door
C) Virus
D) Trojan horse
72 Techniques used to obtain confidential information, often by tricking people, are referred to as what?
A) Pretexting
B) Posing
C) Identity theft
D) Social engineering
73 Which of the following statements is true?
A) E-business is a subset of e-commerce
B) E-commerce is a subset of e-business
C) E-business and e-commerce are the same thing
D) E-business and e-commerce are not related
74 Which of the following statements best describes the risks of Enterprise Resource Planning (ERP) systems?
A) The risks of implementing and operating ERP systems are nearly identical to the risks of implementing and operating IT systems.
B) The risks of operating and implementing ERP systems are greater than the risks of implementing and operating IT systems, due to the scope, size, and complexity of ERP systems.
C) The risks of implementing ERP systems are greater than the risks of implementing IT systems, but the operating risks are nearly identical.
D) The risks of operating ERP systems are greater than the risks of operating IT systems, but the implementation risks are nearly identical.
75 Management of an Internet retail company is concerned about the possibility of computer data eavesdropping and wiretapping and wants to maintain the confidentiality of its information as it is transmitted. The company should make use of:
A) Data encryption
B) Input controls
C) Redundant servers
D) Password codes
76 AICPA Trust Services Principles describe five categories of IT risks and controls. Which of these five categories would best be described by the statement, "The system is protected against unauthorized access"?
A) Security
B) Processing integrity
C) Confidentiality
D) Availability
77 Which of the following is not a control intended to authenticate users?
A) User log-in
B) Security token
C) Encryption
D) Biometric devices
78 Which of the following is not criticism(s) of consequentialist theories in Ethics?
A) The rights of individuals are not considered
B) It does not consider the minority question
C) It is not clear whose judgment is the consequence examined
D) Cost-benefit analysis is not applicable as a basic form of the theories
79 Which of the following statements about the control environment is false?
A) Management's attitudes toward internal control and ethical behavior have little impact on employee beliefs or actions.
B) An overly complex or unclear organizational structure may be indicative of problems that are more serious.
C) A written policy and procedures manual is an important tool for assigning authority and responsibility.
D) Supervision is especially important in organizations that cannot afford elaborate responsibility reporting or are too small to have an adequate separation of duties.
80 Which of these is not one of the three major types of controls?
A) Preventive
B) Corrective
C) Detective
D) Objective

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!