ACC 5130 – Quiz #12 – Chapters 8 & 9 – Flashcards
Unlock all answers in this set
Unlock answersquestion
The Sarbanes-Oxley Act (SOX) applies to
answer
all publicly traded companies.
question
COSO requires that any internal deficiencies identified through monitoring be reported to whom?
answer
the board of directors
question
Information rights management software can do all of the following except
answer
authenticate individuals accessing information.
question
There are "white hat" hackers and "black hat" hackers. Cowboy451 was one of the "black hat" hackers. He had researched an exploit and determined that he could penetrate the target system, download a file containing valuable data, and cover his tracks in eight minutes. Six minutes into the attack he was locked out of the system. Using the notation of the time-based model of security, which of the following must be true?
answer
P > 6
question
Data masking is also referred to as
answer
tokenization.
question
Which of the following is not a factor of internal environment according to the COSO Enterprise Risk Management Framework?
answer
analyzing past financial performance and reporting
question
Using a combination of symmetric and asymmetric key encryption, Sofia Chiamaka sent a report to her home office in Bangalore, India. She received an e-mail acknowledgement that her report had been received, but a few minutes later she received a second e-mail that contained a different hash total than the one associated with her report. This most likely explanation for this result is that
answer
the symmetric encryption key had been compromised.
question
It was 8:03 A.M. when Jiao Jan, the Network Administrator for South Asian Technologies, was informed that the intrusion detection system had identified an ongoing attempt to breach network security. By the time that Jiao had identified and blocked the attack, the hacker had accessed and downloaded several files from the company's server. Using the notation for the time-based model of security, in this case
answer
D > P
question
Identify the item below which is not a piece of legislation passed to protect individuals against identity theft or to secure individuals' privacy.
answer
the Affordable Care Act
question
On April 1, 2012, students enrolled in an economics course at Harvard University received an e-mail stating that class would be cancelled. The e-mail claimed to be from the professor, but it wasn't. Computer forensic experts determined that the e-mail was sent from a computer in one of the campus labs at 6:32 A.M. They were then able to uniquely identify the computer that was used by means of its network interface card's ________ address. Security cameras revealed the identity of the student responsible for spoofing the class.
answer
MAC