Question
1. John smith, an IT consultant, took a call from a client. John, I need to interact online in real time with our affilliate in
1. John smith, an IT consultant, took a call from a client. "John, I need to interact online in real time with our affilliate in india to collaborate on a new product design, I must be certain that our communication aren't intercepted. what do you suggest?" John Responded, "The best solution is to implement
A. Multifactor authentication"
B. an Asymmetric encryption system with digital signitures"
C. a virtual private network"
D. a private cloud environment"
2. the controller of Big Data company found errors in the financial statements created in the ERP system. she investigated and discovered errors in the data and database properties for the sales table. assuming Big Data company implemented proper internal controls for its information technology (IT), who is the appropriate person(s) to correct the data and database properties.
A. the accounting clerk with approval by the controller
B. the controller
C. Database Administrator with approval from the IT Director
D. the ERP system programmer
3. The public key infrastructure enables electronic commerce over the internet. which of the following statements is false?
A. certificate authorities are independent organizations that issue public and private keys.
B. Both a public key and private key are needed to complete the secure electronic commerce transaction
C. Symmetric encryption is more efficient than asymmetric encryption and is used to encrypt messages and documents sent between parties.
D. the purchaser of good shares his private key with the seller in order for the seller to decrypt the purchaser's encrypted order information.
E. All the above are true statements
4. which of the following is a component of internal control in the 2013 COSO framework
A. Financial reporting B. Risk assessment C. Operating effectiveness D. Organizational structure
5. the COBIT5 framework primarily relates to
A. best practices and effective governance and management of private companies
B. best practices and effective governance and management of information technology
C. best practices and effective governance and management of organizational assets
D. best practices and effective governence and management of public companies
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started