Você está na página 1de 4

Name: ________________________________________ Date: ___________

Course Year & Section: _____________________ Score: __________

Instruction: Answer the following questions. Strictly NO ERASURES are


allowed.

I. MULTIPLE CHOICE. Choose the best answer. Encircle the letter of your choice.
1. Risk that exists before any plans are made to control it.
A. Inherent
B. Constitutional
C. Programmed
D. Residual

2. Verifies who a person is.


A. Authorization
B. Authentication
C. Intrusion
D. Verification

3. Software or hardware used to filter information.


A. Anti-virus
B. Firewall
C. Defender
D. Password

4. Connects an organizations information system to the Internet


A. Wifi
B. Internet
C. Border router
D. LAN

5. Remaining risk after controls are in place to reduce it


A. Inherent
B. Constitutional
C. Programmed
D. Residual

6. Monitors patterns in the traffic flow, rather than only inspecting individual packets, to
identify and automatically block attacks
A. Intrusion Prevention Systems (IPS)
B. Demilitarized Zone (DMZ)
C. End-Point Configuration
D. Log Analysis

7. Process of examining logs to identify evidence of possible attacks


A. Intrusion Prevention Systems (IPS)
B. Demilitarized Zone (DMZ)

Page 1 of 4
C. End-Point Configuration
D. Log Analysis

8. Disable unnecessary features that may be vulnerable to attack on servers, printers,


workstations
A. Intrusion Prevention Systems (IPS)
B. Demilitarized Zone (DMZ)
C. End-Point Configuration
D. Log Analysis

9. Separate network that permits controlled access from the Internet to selected resources
A. Intrusion Prevention Systems (IPS)
B. Demilitarized Zone (DMZ)
C. End-Point Configuration
D. Log Analysis

10. Determines what a person can access


A. Authorization
B. Authentication
C. Intrusion
D. Verification

11. Unsolicited e-mail that contains either advertising or offensive content


A. SPAM
B. Identity Theft
C. Privacy
D. Flood

12. The unauthorized use of someones personal information for the perpetrators benefit.
A. SPAM
B. Identity Theft
C. Privacy
D. Flood

13. Process of transforming normal content, called plaintext, into unreadable gibberish
A. Encryption
B. Encrypt
C. Password Protected
D. Algorithm

14. Manner in which key and text is combined to create scrambled text
A. Encryption
B. Encrypt
C. Password Protected
D. Algorithm

Page 2 of 4
15. One key used to both encrypt and decrypt
A. Asymmetric
B. Symmetric
C. Hybrid Solution
D. hashing

16. A facility that is not only prewired for telephone and Internet access but also contains all
the computing and office equipment the organization needs to perform its essential
business activities
A. Cold Site
B. Hot Site
C. Second Data-Center
D. Business Continuity Plan (BCP)

17. Converts information into a hashed code of fixed length.


A. Asymmetric
B. Symmetric
C. Hybrid Solution
D. hashing

18. Private communication channels, often referred to as tunnels, which are accessible only
to those parties possessing the appropriate encryption and decryption keys.
A. Virtual Private Network (VPN)
B. Internet Protocol version 4 (IPv4)
C. Internet Protocol version 6 (IPv6
D. Local Area Network (LAN)

19. An empty building that is prewired for necessary telephone and Internet access, plus a
contract with one or more vendors to provide all necessary equipment within a specified
period of time
A. Cold Site
B. Hot Site
C. Second Data-Center
D. Disaster Recovery Plan (DRP)

20. Procedures to restore an organizations IT function in the event that its data center is
destroyed
A. Cold Site
B. Hot Site
C. Second Data-Center
D. Disaster Recovery Plan (DRP)

21. Examines the reliability and integrity of financial transactions, accounting records, and
financial statements.
A. Financial audit

Page 3 of 4
B. Information System audit
C. Operational audit
D. Compliance audit

22. Economical and efficient use of resources and the accomplishment of established goals
and objectives
A. Financial audit
B. Investigative audit
C. Operational audit
D. Compliance audit

23. Incidents of possible fraud, misappropriation of assets, waste and abuse, or improper
governmental activities.
A. Financial audit
B. Investigative audit
C. Operational audit
D. Compliance audit

24. Determines whether entities are complying with applicable laws, regulations, policies,
and procedures
A. Financial audit
B. Investigative audit
C. Operational audit
D. Compliance audit

25. Auditor-created program is run and used to compare against source code
A. Parallel Simulation
B. Reprocessing
C. Source Code Comparison
D. Program Modification

Page 4 of 4

Você também pode gostar