online cpe for cpas
Home | Sign In | Cart

Please Sign In
3/29/2024
online cpe for cpas

Browse Courses


  
  
RESOURCES
State Requirements
FAQs
Request a Course
Contact Us



Course 571003- Computer Security: Crime and Fraud Protection
  Final Exam
Status: Please Sign In to Save
Answers Permanently
571003v - Computer Security: Crime and Fraud Protection

My Score: 0%

0 Correct Responses
of 70 Total Questions
Technology & Operations
14 CPE Credit Hours

3/29/2024
Final Exam
Get Adobe Reader
Click the "Grade Exam" button to save your answers and to grade your exam. You may click "Grade Exam" as often as necessary. Once you get 70% or higher, you will have the option to see which questions you missed and to create your Certificate of Completion.



Read 'Chapter 1: Organizational Policy' & answer the following question(s):
1. A good manager will know the types and forms of information generated and how the information is used by the business before planning how to manage it. T F
2. In designing and implementing risk-management procedures and controls the manager is not responsible for:
3. Optional security policy that defines the limit of acceptable behavior should include:
4.      The responsibility of the risk-manager does not include:
5.      Not every organization need define security policies and acceptable behavior. T F
6.      Proper security safeguards includes all except:
7.     A security policy includes:
8.      For a security policy to succeed, it is not necessary for all individuals or departments to participate. T F
Read 'Chapter 2: Physical Security and Data Preservation' & answer the following question(s):
9.      The first line of defense for a computer system is to protect it physically: the plant, the equipment, and the personnel. T F
10. Safeguards that help protect computer facilities from accidents and disaster like floods and fire include all except:
11. Maintenance and preventive care logs should not contain:
12.      Computer facilities are rarely susceptible to damage from environmental factors. T F
13. Computer facilities are susceptible to damage from a variety of environmental factors except:
14. Simple precautions to minimize static electricity do not include:
15.      Data that is no longer needed must be destroyed. T F
16. Computer and terminal controls should include the:
17. Special fasteners can be used to protect RAM chips and internal components using cover locks on all except:
Read 'Chapter 3: Hardware Security' & answer the following question(s):
18.      Software security depends on hardware security. T F
19.    Which of the following is not one of the most common hardware problems:
20. Data integrity can be ensured by:
21.      Data integrity is as important to protect as actual hardware. T F
22. According to computer crime surveys the biggest dollar loss occurs by:
23. Major computer vendors offering security products to safeguard user hardware and software are:
24. Major vendors offer the following security features except:
25.      The banks use smart card systems for computer security because they are not vulnerable to high-risk attacks. T F
26. Smart Card vulnerabilities do not include:
27. A biometric product that is created by sound waves generated by an individual speaking a given phrase or password is a:
Read 'Chapter 4: Software Security' & answer the following question(s):
28. A computer virus is a clinically injected organism into a computer system. T F
29. A program that replicates itself but does not infect other programs is a:
30. Viruses remain free to spread into other programs because most common viruses give off no symptoms of their infection. T F
31. The top information security products and services now in use do not include:
32. Which of the following is not a type of viruses:
33. Firewalls do not:
34. A system that enforces an access control policy between two networks is a:
35. Encryption is the transmission of data into secret code. T F
36. Which one of the following is not a practical application of Security Socket Layer (SSL)?
Read 'Chapter 5: Personnel Security' & answer the following question(s):
37. It is not necessary to screen or pre-screen potential employees because their resumes guarantee their qualifications and honesty. T F
38. when checking and screening for pre-employment backgrounds you do not have to check:
39. Companies should insist that new employees in sensitive jobs sign employment agreements with non-disclosure provisions. T F
40. Formal performance evaluations should be used to routinely assess employees’ performance and skill level. T F
41. Effective performance appraisals will not detect:
42. When training new employees which one of the following should not be addressed:
43. Employees can cause considerable damage if terminated except for:
Read 'Chapter 6: Network Security' & answer the following question(s):
44. An attacker that is able to read or copy confidential information has:
45. Most local area network or communication software packages contain encryption and security features. T F
46. It is important to realize that simply keeping the telephone number secret is sufficient. T F
47. Which of the following is not a tool used to implement the security plan:
48. A saboteur’s tools do not include:
49. Which one of the following is not a common type of network topologies:
50. Risks related to software bugs cannot easily be reduced by:
Read 'Chapter 7: Security Policy' & answer the following question(s):
51. In formulating a policy you must first ask yourself the following questions except:
52. Computer security risk analysis and management does not involve:
53. Which of the following is not an example of human factor threats:
54. An account administrator is not intended to ensure:
55. Disruption in computer processing can be classified as all except:
56. Specialists inside and outside organizations who cannot suggest improvements and modifications in contingency planning are:
57. Which of the following is not a part of contingency plans:
58. Systems and program documentation that should be backed-up do not include:
59. Fire damage can be reduced by:
Read 'Chapter 8: Contingency Planning' & answer the following question(s):
Read 'Chapter 9: Auditing and Legal Issues' & answer the following question(s):
60. Security auditing by Information Technology (IT) auditors and financial auditors can enhance audit efficiency by all except:
61. IT auditors typically do not review the following:
62. Which one of the following is not a control technique at the environmental level:
63. Basic EDI security risks do not encompass:
Read 'Chapter 10: Computer Crime, Cyber fraud, and Recent Trends' & answer the following question(s):
64. Penalties for violation of the U.S. Computer Fraud and Abuse Act include:
65. Which one of the following statements is not included in the definition of The Association of Information Technology Professionals (ATIP) computer crime as?
66. Hacking is the obsessive use of computers, or the unauthorized access and use of networked computer systems. Which of the following is not considered a hacker?
67. Many computer crimes involve the theft of money. In the majority of cases, they are:
68. Which one of the following would not be considered as a way that a computer virus can enter a computer system?
69. The unauthorized use of private and confidential personal information has seriously damaged the privacy of individuals. Which of the following is an example of using the Internet to violate a person's privacy?
70. Individuals have been mistakenly arrested and jailed, and people have been denied credit because of their physical profiles. These are examples of:
Return to Syllabus

COPYRIGHT 2002-2009    Apex CPE - ALL RIGHTS RESERVED