Chapter 14 Test Bank MCQ
Chapter 14 Test Bank MCQ
ESSAY. Write your answer in the space provided or on a separate sheet of paper.
1) Describe the process of using asymmetric-key encryption to authenticate the trading
partner involved in e-business.
Version 1 1
4) What are included in disaster recovery planning and business continuity management?
Are these concepts related?
5) What is a digital signature? How could a digital signature ensure data integrity when
conducting e-business?
MULTIPLE CHOICE - Choose the one alternative that best completes the statement or
answers the question.
6) In general, the goal of information security management is to protect all of the following
except:
A) Confidentiality.
B) Integrity.
C) Availability.
D) Redundancy.
Version 1 2
A) A digital signature can ensure data integrity.
B) A digital signature also authenticates the document creator.
C) A digital signature is an encrypted message digest.
D) A digital signature is a message digest encrypted using the document creator's public
key.
A) To establish a framework for controlling the design, security, and use of computer
programs throughout an organization.
B) To ensure that data storage media are subject to authorization prior to access,
change, or destruction.
C) To formalize standard, rules, and procedures to ensure the organization's control are
properly executed.
D) To monitor the use of system software to prevent unauthorized access to system
software and computer programs.
9) An entity doing business on the internet most likely could use any of the following
methods to prevent unauthorized intruders from accessing proprietary information except:
A) Password management.
B) Data encryption.
C) Digital certificates.
D) Batch processing.
10) When client's accounts payable computer system was relocated, the administrator
provided support through a dial-up connection to server. Subsequently, the administrator left the
company. No changes were made to the accounts payable system at that time. Which of the
following situations represents the greatest security risk?
Version 1 3
A) User passwords are not required to the in alpha-numeric format.
B) Management procedures for user accounts are not documented.
C) User accounts are not removed upon termination of employees.
D) Security logs are not periodically reviewed for violations.
11) An information technology director collected the names and locations of key vendors,
current hardware configuration, names of team members, and an alternative processing location.
What is the director most likely preparing?
12) Bacchus, Inc. is a large multinational corporation with various business units around the
world. After a fire destroyed the corporation headquarters and largest manufacturing site, plans
for which of the following would help Bacchus ensure a timely recovery?
A) Daily backup.
B) Network security.
C) Business continuity.
D) Backup power.
Version 1 4
A) It is a process that establishes the origin of information or determines the identity of
a user, process, or device.
B) Only one key is used for encryption and decryption purposes in the authentication
process.
C) Successful authentication can prevent repudiation in electronic transactions.
D) We need to use asymmetric-key encryption to authenticate the sender of a document
or data set.
14) Which of the following is not included in the remediation phase for vulnerability
management?
15) Which of the following does not represent a viable data backup method?
Version 1 5
A) When using asymmetric-key encryption method, a total of two keys are necessary in
electronic communication between two parties.
B) Employees in the same company share the same public key.
C) Most companies would like to manage the private keys for their employees.
D) Most companies would like to use a Certificate Authority to manage the public keys
of their employees.
E) Two of the above are correct.
A) A fraud prevention program starts with a fraud risk assessment across the entire firm
B) The audit committee typically has an oversight role in risk assessment process
C) Communicating a firm's policy file to employees is one of the most important
responsibilities of management
D) A fraud prevention program should include an evaluation on the efficiency of
business processes.
18) A disaster recovery approach should include which of the following elements?
A) Encryption.
B) Firewalls.
C) Regular backups.
D) Surge protectors.
Version 1 6
A) Users are assigned passwords when accounts are created, but do not change them.
20) To prevent invalid data input, a bank added an extra number at the end of each account
number and subjected the new number to an algorithm. This technique is known as:
A) A validation check.
B) check digit verification.
C) A dependency check.
D) A format check.
21) Why do Certificate Authority (CA) play an important role in a company's information
security management?
22) When computer programs or files can be accessed from terminals, users should be
required to enter a(n):
A) Parity check.
B) Password as a personal identification code.
C) Check digit.
Version 1 7
D) Echo check.
23) Which of the following controls would most likely assure that a company can reconstruct
its financial records?
24) Why would companies want to use digital signatures when conducting e-business?
Version 1 8
26) Select a correct statement regarding a hashing process.
A) It is reversible.
B) The outcome is a message digest.
C) It is not necessary to use a hashing process in creating a digital signature.
D) It is used for authentication.
27) Which of the following IT controls would best prevent a developer from inappropriately
accessing the system?
28) Which of the following IT controls would best prevent a currency trader from concealing
his/her trading errors?
Version 1 9
D) Lack of disaster recovery plan.
30) Which of the following is not an example of vulnerability within the process of IT
operations?
32) What could result from the failure to audit and terminate unused accounts in a timely
manner?
Version 1 10
33) Which of the following describes the primary goals of the CIA approach to information
security management?
34) Which of the following is not one of the common techniques for information security
risks and attacks?
A) Spam.
B) Botnet.
C) TraceRT.
D) Social Engineering.
35) Encryption is a control that changes plain text into which of the following?
A) Cyberspace.
B) Cryptext.
C) Mnemonic code.
D) Cyphertext.
36) Asymmetric-key encryption uses which of the following techniques to allow users to
communicate securely?
A) A message digest.
B) A 16-bit encryption key.
C) A public key and a private key.
Version 1 11
D) A digital signature.
37) A Public Key Infrastructure (PKI) provides the ability to do which of the following?
38) Which of the following best illustrates the use of multifactor authentication?
39) Both ISACA and the GTAG define vulnerability. Which of the following does not
represent one of these definitions?
Version 1 12
40) Which of the following statements is true regarding risk management and vulnerability
management?
A) They both have the objective of reducing the likelihood that detrimental events
occur.
B) Risk management is often conducted using an IT asset-based approach.
C) Vulnerability management is more complex and strategic.
D) Both approaches involve processes that typically take many months or years to
complete.
41) Which of the following describes the recommended prerequisites for managing
vulnerabilities?
42) Which of the following is not one of the main components of vulnerability management
and assessment?
A) Identification.
B) Remediation.
C) Internalization.
D) Maintenance.
Version 1 13
43) For businesses considering a cloud computing solution, which of the following should
they ask the cloud vendor to provide before entering into a contract for critical business
operations?
A) FASB 51 Report.
B) Audit Report.
C) SAS 3 Report.
D) SOC 2 Report.
44) Which of the following statements is most accurate with regard to business continuity
management (BCM) and disaster recovery planning (DRP)?
45) A RAID array implemented in a data center is an example of which of the following?
A) Virtualization.
B) Uninterruptible power supply.
C) Fault tolerance.
D) SOC 3.
SHORT ANSWER. Write the word or phrase that best completes each statement or
answers the question.
46) A magnetic tape used to store data backups was lost while it was being transported to an
offsite storage location. The data on the tape includes customers’ credit card and personal
information. Which preventive control(s) should have been used to minimize the potential loss?
Version 1 14
47) List the following steps regarding computer fraud risk assessments in sequence.(a)
Assessing the likelihood and business impact of a control failure and/or a fraud incident.(b)
Mapping existing controls to potential fraud schemes and identifying gaps.(c) Identifying
potential IT fraud schemes and prioritizing them based on likelihood and impact.(d) Identifying
relevant IT fraud risk factors.(e) Testing operating effectiveness of fraud prevention and
detection controls.
TRUE/FALSE - Write 'T' if the statement is true and 'F' if the statement is false.
48) The fraud triangle includes incentive, opportunity and an attitude to rationalize the fraud.
⊚ true
⊚ false
49) The goal of information security management is to maintain confidentiality, integrity and
availability of a firm's information.
⊚ true
⊚ false
Version 1 15
50) Encryption is a preventive control ensuring data confidentiality and privacy during
transmission and for storage.
⊚ true
⊚ false
51) Asymmetric-key encryption is suitable for encrypting large data sets or messages.
⊚ true
⊚ false
52) Key distribution and key management are problematic under the symmetric-key
encryption.
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 16
54) A Certificate Authority (CA) issues digital certificates to bond the subscriber with a
public key and a private key.
⊚ true
⊚ false
55) A company’s audit committee is solely responsible for fraud risk assessments.
⊚ true
⊚ false
56) One type of fault tolerance is using redundant units to provide a system the ability to
continue functioning when part of the system fails.
⊚ true
⊚ false
57) Disaster recovery planning and business continuity management are unrealted.
⊚ true
⊚ false
Version 1 17
⊚ true
⊚ false
59) The goal of information security management is to enhance the confidence, integrity and
authority (CIA) of a firm's information.
⊚ true
⊚ false
⊚ true
⊚ false
61) Spam is a self-replicating program that runs and spreads by modifying other programs or
files.
⊚ true
⊚ false
62) Encryption and hashing are similar process to maintain data confidentiality.
⊚ true
⊚ false
Version 1 18
63) Hashing process can be reversed and it is used for maintaining data confidentiality.
⊚ true
⊚ false
64) When using asymmetric encryption algorithm, for two trading parties to conduct e-
business, they need to use two keys.
⊚ true
⊚ false
65) Symmetric-key encryption is rarely used today due to key distribution and key
management issues.
⊚ true
⊚ false
66) Most companies use both symmetric-key and asymmetric-key encryption methods when
conducting e-business.
⊚ true
⊚ false
Version 1 19
67) The purpose of using a digital signature is for authentication.
⊚ true
⊚ false
Version 1 20
Answer Key
Version 1 21
4) Disaster recovery planning (DRP) must include a clearly defined and
documented plan that covers key personnel, resources including IT
infrastructure and applications, and actions required to be carried out in
order to continue or resume the systems for critical business functions
within planned levels of disruption. Business continuity management
(BCM) includes the activities required to keep a firm running during a
period of displacement or interruption of normal operations. DRP is a
key component of the BCM. BCM is broader than DRP and is concerned
about the entire business processes rather than particular assets, such as
IT infrastructure and applications.
Version 1 22
6) D
7) D
8) B
9) D
10) C
11) B
12) C
13) B
14) C
15) A
16) D
17) D
18) C
19) A
Version 1 23
20) B
21) C
22) B
23) B
24) D
25) D
26) B
27) B
28) A
29) B
30) A
31) B
32) D
33) B
Version 1 24
34) C
35) D
36) C
37) D
38) B
39) B
40) A
41) B
42) C
43) D
44) A
45) C
47) d, c, b, e, a
Version 1 25
48) TRUE
49) TRUE
50) TRUE
51) FALSE
52) TRUE
53) FALSE
54) TRUE
55) FALSE
56) TRUE
57) FALSE
58) TRUE
59) FALSE
60) FALSE
61) FALSE
Version 1 26
62) FALSE
63) FALSE
64) FALSE
65) FALSE
66) TRUE
67) FALSE
Version 1 27