The Sarbanes-Oxley Act (SOX) applies to
all publicly traded companies.
COSO requires that any internal deficiencies identified through monitoring be reported to whom?
the board of directors
Information rights management software can do all of the following except
authenticate individuals accessing information.
There are “white hat” hackers and “black hat” hackers. Cowboy451 was one of the “black hat” hackers. He had researched an exploit and determined that he could penetrate the target system, download a file containing valuable data, and cover his tracks in eight minutes. Six minutes into the attack he was locked out of the system. Using the notation of the time-based model of security, which of the following must be true?
P > 6
Data masking is also referred to as
Which of the following is not a factor of internal environment according to the COSO Enterprise Risk Management Framework?
analyzing past financial performance and reporting
Using a combination of symmetric and asymmetric key encryption, Sofia Chiamaka sent a report to her home office in Bangalore, India. She received an e-mail acknowledgement that her report had been received, but a few minutes later she received a second e-mail that contained a different hash total than the one associated with her report. This most likely explanation for this result is that
the symmetric encryption key had been compromised.
It was 8:03 A.M. when Jiao Jan, the Network Administrator for South Asian Technologies, was informed that the intrusion detection system had identified an ongoing attempt to breach network security. By the time that Jiao had identified and blocked the attack, the hacker had accessed and downloaded several files from the company’s server. Using the notation for the time-based model of security, in this case
D > P
Identify the item below which is not a piece of legislation passed to protect individuals against identity theft or to secure individuals’ privacy.
the Affordable Care Act
On April 1, 2012, students enrolled in an economics course at Harvard University received an e-mail stating that class would be cancelled. The e-mail claimed to be from the professor, but it wasn’t. Computer forensic experts determined that the e-mail was sent from a computer in one of the campus labs at 6:32 A.M. They were then able to uniquely identify the computer that was used by means of its network interface card’s ________ address. Security cameras revealed the identity of the student responsible for spoofing the class.
Need essay sample on "ACC 5130 – Quiz #12 – Chapters 8 & 9"? We will write a custom essay sample specifically for you for only $ 13.90/page