一级做a爱片,色站综合,99偷拍视频精品一区二区,亚洲精品色无码AV

當前位置:

CIA考試題:CIA英文試題訓練(1)

發(fā)表時間:2014/4/16 17:00:00 來源:中大網(wǎng)校 點擊關(guān)注微信:關(guān)注中大網(wǎng)校微信
關(guān)注公眾號
CIA考試題:CIA英文試題訓練(1)
1. Client-server architecture may potentially involve a variety of hardware, systems software, and application software from many vendors. The best way to protect a client-server system from unauthorized access is through
A A combination of application and general access control techniques
B Use of a commercially available authentication system
C Encryption of all network traffic
D Thorough testing and evaluation of remote procedure calls.
A correct Security is more difficult to achieve in a client-server system than in a mainframe environment. The system has numerous access points, and users have many chances to alter data. Thus, application controls must be combined with general access controls to protect the system.
B incorrect  Authentication systems are only a part of the solution.
C incorrect  Encryption affects only general access control techniques.
D incorrect Testing and evaluation of RPC’s may be only a small part of an overall security review. A company with several hundred stores has a network for the stores to transmit sales data to headquarters.The network is also used for 
  
2  The information systems and audit directors also agreed that maintaining the integrity of the system that kept inventory data was crucial for distributing correct product quantities to stores. The best way to ensure the integrity of the application software is through
A Access controls for terminals in the receiving department
B Audit trails for items sold and received.
C Change controls for inventory software.
D Monitoring software for the network.
 
A  incorrect Access controls for terminals in the receiving department ensure that only authorized receiving personnel have access to specific categories of information. However, they do not affect personnel in other functional areas.
B  Audit trails permit audits of transaction updates to date files but do not ensure the integrity of application software.
C  Change control is vital to the effectiveness of internal control. It is the set of procedures that ensure that only authorized, tested, and documented program changes are made. Such procedures include not only segregation of duties in the development and implementation processes, but also design and code walk-through, coordination of changes, review and approval by users and management, review of compliance with standards, minimum testing requirements, and backout procedures in the event of failure.
D  Monitoring software is designed to monitor performance (human or machine) for specified function such as capacity used or number of tasks performed. 
 
3  The information systems director is concerned that someone might be able to enter fictitious orders from store terminals. Of the following, the best control for minimizing the likelihood of such an occurrence is to 
A  no  Encrypting transmissions from the stores would ensure the confidentiality of the transmissions but would not deter the entry of bogus transactions.
B  Change controls for programs ensure that only program changes are authorized, tested, and documented. Initial data input also needs to be restricted and available only to those who are authorized.
C  yes   Password control procedures, which are type of access control, prevent the improper use or manipulation of data files and programs. They ensure that only those persons with a bona fide purpose and authorization have access to data processing. The use of passwords is an effective control in an online system to prevent unauthorized access to computer files, especially if remote terminals are involved. List of authorized persons are maintained in the computer.
D  Encouraging store employees to report suspicious activity is a good practice, but suspicious activity often goes undetected or an employee does not feel comfortable reporting on a co-worker. 
 
4 The information systems and audit directors agreed on the need to maintain security and integrity of transmissions and the data they represent. The best means of ensuring the confidentiality of satellite transmissions would be     1380
A  Encryption 
B  Access control
C  Monitoring software
D  Cyclic redundancy checks
 
A yes  Encryption encodes data before transmission over communication lines in order to prevent its use by unauthorized users but allow its recovery by authorized users. Encryption is the best means of ensuring the confidentiality of satellite transmissions. If an unauthorized individual records the transmissions, they will not be intelligible without proper decoding.
B  no Access control protests against unauthorized entry to the application systems but does not protect the transmission of data.
C  no  Monitoring software is designed to monitor performance( human or machine ) for specified functions such as number of tasks preformed or capacity used.
D  no  Cyclic redundancy checks are complies computations performed with the data bits and the check bits in data transmissions to ensure the integrity, not the confidentiality, of the data.
5  Controls that are designed to provide management with assurance of the realization of specified minimum gross margins on sales are 
A  Directive controls
B  Preventive controls
C  Detective controls.
D  Output controls. 
 
A yes  According to SIAS 1, “A control is any action taken by management to enhance the likelihood that established objectives and goals will be achieved” The objective of directive controls is to cause or encourage desirable events to occur, e.g., providing management with assurance of the realization of specified minimum gross margins on sales.
B  no  Preventive controls deter undesirable events from occurring,.
C  no  Detective controls detect and correct undesirable events.\
D  no Output controls  relate to the accuracy and reasonableness of information processed by a system, not to operating controls.

(責任編輯:中大編輯)

2頁,當前第1頁  第一頁  前一頁  下一頁
最近更新 考試動態(tài) 更多>

考試科目

绝色av一区二区| 美女扣逼视频| 欧美爽爽干| 亚洲无码人妻斩夜夜| 久久国产精品影视| 日韩毛片AV| 久久99免费播放| 日韩高清AV播放| 国产人成精品香港三级在线| 福利涩导航| 黄色网站天天艹夜| 国产精品婷婷久久久久久| 国产性另类| sm观看| 激情五月花综合| 强开小婷嫩苞又嫩又紧视频韩国| 岛国视频一区二区| 久久精品中文一区二区| 性videostv另类极品| 久久电影一区| 国产永久域名| 中文字幕欧美成人免费| 性爱视频欧美日韩| 夜夜骑天天干人人操| 日韩精品人妻中文字幕在线有码| 久久久五月丁香| 天狠狠干狠狠操天天射| 午夜伦理在线| 亚洲日韩v无码中文字幕| 麻豆欧美一区| 青青久久狠狠干| 国产超碰人人模人人爽人人添| 欧美精品综合发布| 亚州久久艹精品| 日韩AV人人夜夜澡人人爽| 无码一区二区日韩| 欲求不满的精品人妻| 日韩国产狼友| 免费的美女色视频网站| 中文字幕日本理论| 国产在线观看欧美护士|