Question: When classifying IT-related controls based on _________, we are grouping them based on whether they are automated or manual in nature. Implementation Function Efficiency Control
When classifying IT-related controls based on _________, we are grouping them based on whether they are automated or manual in nature.
| Implementation | ||
| Function | ||
| Efficiency | ||
| Control |
Detecting fraud is less challenging when two or more individuals collude.
True
False
An ever-growing population of Internet-connected devices, dubbed the Internet of Things, has _______ the difficulty of safeguarding logical computer access.
| Increased | ||
| Decreased | ||
| Unaffected | ||
| made irrelevant |
The highest percentage of fraud involved employees working in the ______ department?
| Accounting | ||
| IT | ||
| Finance | ||
| Human Resources |
Which application control is intended to protect the processing of data.
| Processing Controls | ||
| Security Controls | ||
| Input Controls | ||
| Output Controls |
The tone set by management, helps to establish the level of security and control consciousness in the organization, which is the basis for the ___________.
| Control Environment | ||
| Physical Security | ||
| Process Control | ||
| Intrinsic Control |
_______ help ensure that no transaction or messages are routed to the wrong computer network system address.
| Routing verification procedures | ||
| Message acknowledgment procedures | ||
| Checkpoint procedures | ||
| Eavesdropping procedures |
How many primary sections does ISO/EIC 27002 include?
| 12 | ||
| 10 | ||
| 24 | ||
| 9 |
A ______ is a backup performed while the database is online and available for read/write.
| Hot Backup | ||
| Cold Backup | ||
| Fault Tolerant System | ||
| Watchdog Processor |
Natural disruptions include all of the following except:
| Power Outages | ||
| Floods | ||
| Fires | ||
| Pandemics |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
