ACC 5130 – Quiz #12 – Chapters 8 & 9 – Flashcards
10 test answers
Unlock all answers in this set
Unlock answers 10question
Data masking is also referred to as
answer
tokenization.
Unlock the answer
question
Which of the following is not a factor of internal environment according to the COSO Enterprise Risk Management Framework?
answer
analyzing past financial performance and reporting
Unlock the answer
question
Using a combination of symmetric and asymmetric key encryption, Sofia Chiamaka sent a report to her home office in Bangalore, India. She received an e-mail acknowledgement that her report had been received, but a few minutes later she received a second e-mail that contained a different hash total than the one associated with her report. This most likely explanation for this result is that
answer
the symmetric encryption key had been compromised.
Unlock the answer
question
It was 8:03 A.M. when Jiao Jan, the Network Administrator for South Asian Technologies, was informed that the intrusion detection system had identified an ongoing attempt to breach network security. By the time that Jiao had identified and blocked the attack, the hacker had accessed and downloaded several files from the company's server. Using the notation for the time-based model of security, in this case
answer
D > P
Unlock the answer
question
Identify the item below which is not a piece of legislation passed to protect individuals against identity theft or to secure individuals' privacy.
answer
the Affordable Care Act
Unlock the answer
question
On April 1, 2012, students enrolled in an economics course at Harvard University received an e-mail stating that class would be cancelled. The e-mail claimed to be from the professor, but it wasn't. Computer forensic experts determined that the e-mail was sent from a computer in one of the campus labs at 6:32 A.M. They were then able to uniquely identify the computer that was used by means of its network interface card's ________ address. Security cameras revealed the identity of the student responsible for spoofing the class.
answer
MAC
Unlock the answer