1. Organizations should use off-site storage facilities to maintain _________________ (fill in the blank) of current and critical information within backup files.Choose the BEST answer.
A) Confidentiality B) Integrity C) Redundancy D) Concurrency
2. Processing controls ensure that data is accurate and complete, and is processed only through which of the following? Choose the BEST answer.
A) Documented routines B) Authorized routines C) Accepted routines D) Approved routines
3. Broadly speaking, a Trojan horse is any program that invites the user to run it, but conceals a harmful or malicious payload. The payload may take effect immediately and can lead to immediate yet undesirable effects, or more commonly it may install further harmful software into the user's system to serve the creator's longer-term goals.A Trojan horse's payload would almost always take damaging effect immediately.
A) True B) False C) D)
4. All Social Engineering techniques are based on flaws in:
A) human logic. B) hardware logic. C) software logic. D) device logic. E) group logic. F) None of the choices.
5. The purpose of a mainframe audit is to provide assurance that (choose all that apply):(Select 5answers)
A) processes are being implemented as required B) the mainframe is operating as it should C) security is strong D) procedures in place are working E) procedures in place are updated as needed F) the OS applications are secured
1. Right Answer: C Explanation: Redundancy is the best answer because it provides both integrity and availability. Organizations should use off-site storage facilities to maintain redundancy of current and critical information within backup files.
2. Right Answer: B Explanation: Processing controls ensure that data is accurate and complete, and is processed only through authorized routines.
3. Right Answer: B Explanation: Broadly speaking, a Trojan horse is any program that invites the user to run it, but conceals a harmful or malicious payload. The payload may take effect immediately and can lead to immediate yet undesirable effects, or more commonly it may install further harmful software into the user's system to serve the creator's longer-term goals.
4. Right Answer: A Explanation: Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery for information gathering or computer system access. All Social Engineering techniques are based on flaws in human logic known as cognitive biases. These bias flaws are used in various combinations to create attack techniques.
5. Right Answer: A,B,C,D,E Explanation: The purpose of a mainframe audit is to provide assurance that processes are being implemented as required, the mainframe is operating as it should, security is strong, and that procedures in place are working and are updated as needed. The auditor may accordingly make recommendations for improvement.
Leave a comment