一级做a爱片,色站综合,99偷拍视频精品一区二区,亚洲精品色无码AV

當(dāng)前位置:

CIA考試題:CIA英文試題訓(xùn)練(1)

發(fā)表時(shí)間:2014/4/16 17:00:00 來源:中大網(wǎng)校 點(diǎn)擊關(guān)注微信:關(guān)注中大網(wǎng)校微信
關(guān)注公眾號
CIA考試題:CIA英文試題訓(xùn)練(1)
1. Client-server architecture may potentially involve a variety of hardware, systems software, and application software from many vendors. The best way to protect a client-server system from unauthorized access is through
A A combination of application and general access control techniques
B Use of a commercially available authentication system
C Encryption of all network traffic
D Thorough testing and evaluation of remote procedure calls.
A correct Security is more difficult to achieve in a client-server system than in a mainframe environment. The system has numerous access points, and users have many chances to alter data. Thus, application controls must be combined with general access controls to protect the system.
B incorrect  Authentication systems are only a part of the solution.
C incorrect  Encryption affects only general access control techniques.
D incorrect Testing and evaluation of RPC’s may be only a small part of an overall security review. A company with several hundred stores has a network for the stores to transmit sales data to headquarters.The network is also used for 
  
2  The information systems and audit directors also agreed that maintaining the integrity of the system that kept inventory data was crucial for distributing correct product quantities to stores. The best way to ensure the integrity of the application software is through
A Access controls for terminals in the receiving department
B Audit trails for items sold and received.
C Change controls for inventory software.
D Monitoring software for the network.
 
A  incorrect Access controls for terminals in the receiving department ensure that only authorized receiving personnel have access to specific categories of information. However, they do not affect personnel in other functional areas.
B  Audit trails permit audits of transaction updates to date files but do not ensure the integrity of application software.
C  Change control is vital to the effectiveness of internal control. It is the set of procedures that ensure that only authorized, tested, and documented program changes are made. Such procedures include not only segregation of duties in the development and implementation processes, but also design and code walk-through, coordination of changes, review and approval by users and management, review of compliance with standards, minimum testing requirements, and backout procedures in the event of failure.
D  Monitoring software is designed to monitor performance (human or machine) for specified function such as capacity used or number of tasks performed. 
 
3  The information systems director is concerned that someone might be able to enter fictitious orders from store terminals. Of the following, the best control for minimizing the likelihood of such an occurrence is to 
A  no  Encrypting transmissions from the stores would ensure the confidentiality of the transmissions but would not deter the entry of bogus transactions.
B  Change controls for programs ensure that only program changes are authorized, tested, and documented. Initial data input also needs to be restricted and available only to those who are authorized.
C  yes   Password control procedures, which are type of access control, prevent the improper use or manipulation of data files and programs. They ensure that only those persons with a bona fide purpose and authorization have access to data processing. The use of passwords is an effective control in an online system to prevent unauthorized access to computer files, especially if remote terminals are involved. List of authorized persons are maintained in the computer.
D  Encouraging store employees to report suspicious activity is a good practice, but suspicious activity often goes undetected or an employee does not feel comfortable reporting on a co-worker. 
 
4 The information systems and audit directors agreed on the need to maintain security and integrity of transmissions and the data they represent. The best means of ensuring the confidentiality of satellite transmissions would be     1380
A  Encryption 
B  Access control
C  Monitoring software
D  Cyclic redundancy checks
 
A yes  Encryption encodes data before transmission over communication lines in order to prevent its use by unauthorized users but allow its recovery by authorized users. Encryption is the best means of ensuring the confidentiality of satellite transmissions. If an unauthorized individual records the transmissions, they will not be intelligible without proper decoding.
B  no Access control protests against unauthorized entry to the application systems but does not protect the transmission of data.
C  no  Monitoring software is designed to monitor performance( human or machine ) for specified functions such as number of tasks preformed or capacity used.
D  no  Cyclic redundancy checks are complies computations performed with the data bits and the check bits in data transmissions to ensure the integrity, not the confidentiality, of the data.
5  Controls that are designed to provide management with assurance of the realization of specified minimum gross margins on sales are 
A  Directive controls
B  Preventive controls
C  Detective controls.
D  Output controls. 
 
A yes  According to SIAS 1, “A control is any action taken by management to enhance the likelihood that established objectives and goals will be achieved” The objective of directive controls is to cause or encourage desirable events to occur, e.g., providing management with assurance of the realization of specified minimum gross margins on sales.
B  no  Preventive controls deter undesirable events from occurring,.
C  no  Detective controls detect and correct undesirable events.\
D  no Output controls  relate to the accuracy and reasonableness of information processed by a system, not to operating controls.

(責(zé)任編輯:中大編輯)

2頁,當(dāng)前第1頁  第一頁  前一頁  下一頁
最近更新 考試動態(tài) 更多>

考試科目

亚洲第一精品黄片| 中国少妇性爱| 东京热男人天堂av网| 国产一区二区怡红院| 中国熟女脚交视频| 一本色道久久爱88av| 久久911| 视角毛片一区不卡高端| 欧美亚洲视频在线观看| 中文字字幕在线中文无码| 日本男女高清视频| 日韩av中出电影| 四川一级护士一级毛片| 变态另类东京热| 91成人在线视频| 日韩A级片视频| 亚洲欧洲久久久久久久| 亚洲AV色香蕉一区二区蜜桃小说| 作爱视频高潮| 五月天刺激网| 人妻中文字幕乱人伦在线| 亚洲综合伊人精品| 好好热在线视频| 国产99视频精品免费视频76| 熟妇斩久久| 涩会涩 少妇 最新| 波多野成人无码精品电影| 女人国产在线一区AV| 一区28p| 久久综合五月天| 污片网站免费看| 国产视频第15页| 伊人小视频| 另类色一区二区| 美女毛网站| 日本婷婷| 狠狠色综合网| 欧美在线欧美| 亚洲激情区| 久久综合一区二区| 美女被男子桶|