Escolar Documentos
Profissional Documentos
Cultura Documentos
I. MULTIPLE CHOICE. Choose the best answer. Encircle the letter of your choice.
1. Risk that exists before any plans are made to control it.
A. Inherent
B. Constitutional
C. Programmed
D. Residual
6. Monitors patterns in the traffic flow, rather than only inspecting individual packets, to
identify and automatically block attacks
A. Intrusion Prevention Systems (IPS)
B. Demilitarized Zone (DMZ)
C. End-Point Configuration
D. Log Analysis
Page 1 of 4
C. End-Point Configuration
D. Log Analysis
9. Separate network that permits controlled access from the Internet to selected resources
A. Intrusion Prevention Systems (IPS)
B. Demilitarized Zone (DMZ)
C. End-Point Configuration
D. Log Analysis
12. The unauthorized use of someones personal information for the perpetrators benefit.
A. SPAM
B. Identity Theft
C. Privacy
D. Flood
13. Process of transforming normal content, called plaintext, into unreadable gibberish
A. Encryption
B. Encrypt
C. Password Protected
D. Algorithm
14. Manner in which key and text is combined to create scrambled text
A. Encryption
B. Encrypt
C. Password Protected
D. Algorithm
Page 2 of 4
15. One key used to both encrypt and decrypt
A. Asymmetric
B. Symmetric
C. Hybrid Solution
D. hashing
16. A facility that is not only prewired for telephone and Internet access but also contains all
the computing and office equipment the organization needs to perform its essential
business activities
A. Cold Site
B. Hot Site
C. Second Data-Center
D. Business Continuity Plan (BCP)
18. Private communication channels, often referred to as tunnels, which are accessible only
to those parties possessing the appropriate encryption and decryption keys.
A. Virtual Private Network (VPN)
B. Internet Protocol version 4 (IPv4)
C. Internet Protocol version 6 (IPv6
D. Local Area Network (LAN)
19. An empty building that is prewired for necessary telephone and Internet access, plus a
contract with one or more vendors to provide all necessary equipment within a specified
period of time
A. Cold Site
B. Hot Site
C. Second Data-Center
D. Disaster Recovery Plan (DRP)
20. Procedures to restore an organizations IT function in the event that its data center is
destroyed
A. Cold Site
B. Hot Site
C. Second Data-Center
D. Disaster Recovery Plan (DRP)
21. Examines the reliability and integrity of financial transactions, accounting records, and
financial statements.
A. Financial audit
Page 3 of 4
B. Information System audit
C. Operational audit
D. Compliance audit
22. Economical and efficient use of resources and the accomplishment of established goals
and objectives
A. Financial audit
B. Investigative audit
C. Operational audit
D. Compliance audit
23. Incidents of possible fraud, misappropriation of assets, waste and abuse, or improper
governmental activities.
A. Financial audit
B. Investigative audit
C. Operational audit
D. Compliance audit
24. Determines whether entities are complying with applicable laws, regulations, policies,
and procedures
A. Financial audit
B. Investigative audit
C. Operational audit
D. Compliance audit
25. Auditor-created program is run and used to compare against source code
A. Parallel Simulation
B. Reprocessing
C. Source Code Comparison
D. Program Modification
Page 4 of 4