Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

(TCO 1) Facts that are collected, recorded, stored, and processed by an information system are information. data. systems. mandatory information. Flag this Question Question 2

(TCO 1) Facts that are collected, recorded, stored, and processed by an information system are

information.
data.
systems.
mandatory information.

Flag this Question

Question 2 7 pts

(TCO 2) This control framework's intent includes helping the organization to provide reasonable assurance that objectives are achieved and problems are minimized, and to avoid adverse publicity and damage to the organization's reputation.

ISACA's control objectives for information and related technology
COSO's internal control framework
COSO's enterprise risk management framework
None of the above

Flag this Question

Question 3 7 pts

(TCO 3) What is a major disadvantage to using symmetric encryption to encrypt data?

Both sender and receiver must have the private key before this encryption method will work.
The private key cannot be broken into fragments and distributed to the receiver.
The private key is used by the sender for encryption but not by the receiver for decryption.
The private key is used by the receiver for decryption but not by the sender for encryption.

Flag this Question

Question 4 7 pts

(TCO 3) Multi-factor authentication

involves the use of two or more basic authentication methods.
is a table specifying which portions of the systems users are permitted to access.
provides weaker authentication than the use of effective passwords.
requires the use of more than one effective password.

Flag this Question

Question 5 7 pts

(TCO 4) What is the normal procedure for new customers or customers making a purchase that causes their credit limit to be exceeded?

Routine approval is granted without authorization
Specific approval must be granted by the credit manager
Reject the sale in either case without question

Check the credit bureau for a credit rating on the customer

answer 5 questions with a bc d answers recieve thumbs up

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Audit Security How To Plan Implement And Audit Netsuite Security

Authors: Zenobia Plautz

1st Edition

B0B5KQKXSY, 979-8840043851

More Books

Students also viewed these Accounting questions

Question

2. Identify the purpose of your speech

Answered: 1 week ago