Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which of the following best describes why firms choose to create codes of ethics? Multiple Choice O They allow firms to create a formal set

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed

Which of the following best describes why firms choose to create codes of ethics? Multiple Choice O They allow firms to create a formal set of expectations for employees who may have different sets of personal values. O Companies must have a written code of ethics in order to conduct interstate commerce in the U.S. O Codes of ethics protect firms against lawsuits that may be filed due to corporate fraud. O Because most people will not behave ethically without a written set of guidelines. Which of the following is considered an application input control? Multiple Choice Edit check. Reporting distribution log. Run control total. o oo Exception report. What is the primary objective of data security controls? Multiple Choice O To ensure that data storage media are subject to authorization prior to access, change, or destruction. O To formalize standard, rules, and procedures to ensure the organization's control are properly executed. O To establish a framework for controlling the design, security, and use of computer programs throughout an organization. o To monitor the use of system software to prevent unauthorized access to system software and computer programs. Which of the following best describes what is meant by a breach of security? Multiple Choice Access of personal information on a corporate server. o C ) The unauthorized access to or acquisition of data in an electronic format that contains personal information. o An unencrypted data transmission. o Breaking into a locked room. o Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely? Multiple Choice A public key and a private key. A digital signature. A message digest. A 16-bit encryption key. Data analytics is best described as the science of reducing extremely large datasets down to more manageable databases that can then be processed using traditional tools. True or False True True False False Which of the following best illustrates the use of multifactor authentication? Multiple Choice Requiring the use of a smart card and a password. Requiring password changes every 30, 60, or 90 days. Requiring the use of upper case, lower case, numeric, and special characters for a password. The use of a fingerprint scanner for access to a device

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting A Smart Approach

Authors: Mary Carey, Cathy Knowles, Jane Towers-Clark

3rd Edition

0198745133, 978-0198745136

More Books

Students also viewed these Accounting questions