Words of Wisdom:

"The IRS employees tax manual has instructions for collecting taxes after a nuclear war." - Jeffryma

Cis 462 Midterm Exam All Possible Questions

  • Date Submitted: 11/07/2015 11:31 PM
  • Flesch-Kincaid Score: 40.5 
  • Words: 953
  • Essay Grade: no grades
  • Report this Essay
CIS 462 Midterm Exam All Possible Questions

CIS 462 Midterm Exam All Possible Questions
(Question 1) The use of encryption and digital signatures helps ensure that what was transmitted is the same as what was received. Which of the following is assured?
(Question 2) Which of the following is not one of the four domains of the COBIT framework for ISS management?
(Question 3) What is the primary goal of business process re-engineering?
(Question 4) Passwords and biometrics are most closely associated with which of the following?
(Question 5) What does COBIT stand for?
(Question 6) Which of the following is optional, and sets the parameters within which the others can be used?
(Question 7) Which of the following is not true of segmented networks?
(Question 8) You are on the West Coast but want to connect to your company’s intranet on the East Coast. You use a program to “tunnel” through the Internet to reach the intranet. Which technology are you using?
(Question 9) A policy that addresses the use of personal mobile devices, such as a smartphone, to access an internal business network is an issue of which IT domain?
(Question 10) After entering your user name and password, you enter a number displayed on a security token to gain access to your company’s network. Which type of authentication method does the security token represent?
(Question 11) In the Workstation Domain, ____________ is the best method of reducing the risk of information leakage.
(Question 12) Authentication and encryption of intranet traffic is a _______ Domain issue.
(Question 13) __________ is the ability to reasonably ensure conformity and adherence to both internal and external policies, standards, procedures, laws, and regulations.
(Question 14) What is included in an IT policy framework?
(Question 15) Incident reporting, incident management, and user ID addition/removal are examples of...


Express your owns thoughts and ideas on this essay by writing a grade and/or critique.

  1. No comments