100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

AIS test 4 EXAM REVIEW WITH EXAM QUESTIONS AND CORRECT SOLUTIONS A+ GRADED UPDATED 2025/2026||100% GUARANTEED PASS!!<<LATEST EXAM>>

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
21-09-2025
Written in
2025/2026

AIS test 4 EXAM REVIEW WITH EXAM QUESTIONS AND CORRECT SOLUTIONS A+ GRADED UPDATED 2025/2026||100% GUARANTEED PASS!!&lt;&lt;LATEST EXAM&gt;&gt; An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except: A) Password management. B) Data encryption. C) Digital certificates. D) Batch processing. - ANSWER D When client's accounts payable computer system was relocated, the administrator provided support through a dial-up connection to server. Subsequently, the administrator left the company. No changes were made to the accounts payable system at that time. Which of the following situations represents the greatest security risk? A) User passwords are not required to the in alpha-numeric format. B) Management procedures for user accounts are not documented. C) User accounts are not removed upon termination of employees. D) Security logs are not periodically reviewed for violations. - ANSWER C An information technology director collected the names and locations of key vendors, current hardware configuration, names of team members, and an alternative processing location. What is the director most likely preparing? A) Data restoration plan. B) Disaster recovery plan. C) System security policy. D) System hardware policy. - ANSWER B Bacchus, Inc. is a large multinational corporation with various business units around the world. After a fire destroyed the corporation headquarters and largest manufacturing site, plans for which of the following would help Bacchus ensure a timely recovery? A) Daily backup. B) Network security. C) Business continuity. D) Backup power. - ANSWER C Which of the following statements regarding authentication in conducting ebusiness incorrect? A) It is a process that establishes the origin of information or determines the identity of a user, process, or device. B) Only one key is used for encryption and decryption purposes in the authentication process. C) Successful authentication can prevent repudiation in electronic transactions. D) We need to use asymmetric-key encryption to authenticate the sender of a document or data set. - ANSWER B Which of the following is not included in the remediation phase for vulnerability management? A) Risk Response Plan. B) Policy and procedures for remediation. C) Vulnerability Prioritization. D) Control Implementation. - ANSWER C Which of the following does not represent a viable data backup method? A) Disaster recovery plan. B) Redundant arrays of independent drives. C) Virtualization. D) Cloud computing. - ANSWER A

Show more Read less
Institution
AIS
Course
AIS










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
AIS
Course
AIS

Document information

Uploaded on
September 21, 2025
Number of pages
18
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

AIS test 4 EXAM REVIEW WITH
EXAM QUESTIONS AND CORRECT
SOLUTIONS A+ GRADED UPDATED
2025/2026||100% GUARANTEED
PASS!!<<LATEST EXAM>>
An entity doing business on the internet most likely could use any of the following
methods to prevent unauthorized intruders from accessing proprietary information
except:
A) Password management.
B) Data encryption.
C) Digital certificates.
D) Batch processing. - ANSWER ✓ D

When client's accounts payable computer system was relocated, the administrator
provided support through a dial-up connection to server. Subsequently, the
administrator left the company. No changes were made to the accounts payable
system at that time. Which of the following situations represents the greatest
security risk?
A) User passwords are not required to the in alpha-numeric format.
B) Management procedures for user accounts are not documented.
C) User accounts are not removed upon termination of employees.
D) Security logs are not periodically reviewed for violations. - ANSWER ✓ C

An information technology director collected the names and locations of key
vendors, current hardware configuration, names of team members, and an
alternative processing location. What is the director most likely preparing?
A) Data restoration plan.
B) Disaster recovery plan.
C) System security policy.
D) System hardware policy. - ANSWER ✓ B

Bacchus, Inc. is a large multinational corporation with various business units
around the world. After a fire destroyed the corporation headquarters and largest

,manufacturing site, plans for which of the following would help Bacchus ensure a
timely recovery?
A) Daily backup.
B) Network security.
C) Business continuity.
D) Backup power. - ANSWER ✓ C

Which of the following statements regarding authentication in conducting e-
business incorrect?
A) It is a process that establishes the origin of information or determines the
identity of a user, process, or device.
B) Only one key is used for encryption and decryption purposes in the
authentication process.
C) Successful authentication can prevent repudiation in electronic transactions.
D) We need to use asymmetric-key encryption to authenticate the sender of a
document or data set. - ANSWER ✓ B

Which of the following is not included in the remediation phase for vulnerability
management?
A) Risk Response Plan.
B) Policy and procedures for remediation.
C) Vulnerability Prioritization.
D) Control Implementation. - ANSWER ✓ C

Which of the following does not represent a viable data backup method?
A) Disaster recovery plan.
B) Redundant arrays of independent drives.
C) Virtualization.
D) Cloud computing. - ANSWER ✓ A

Which of the following statements about asymmetric- key encryption is correct?
A) When using asymmetric-key encryption method, a total of two keys are
necessary in electronic communication between two parties.
B) Employees in the same company share the same public key.
C) Most companies would like to manage the private keys for their employees.
D) Most companies would like to use a Certificate Authority to manage the public
keys of their employees.
E) Two of the above are correct. - ANSWER ✓ D

, 32) Which of the following statements is incorrect?
A) A fraud prevention program starts with a fraud risk assessment across the entire
firm
B) The audit committee typically has an oversight role in risk assessment process
C) Communicating a firm's policy file to employees is one of the most important
responsibilities of management
D) A fraud prevention program should include an evaluation on the efficiency of
business processes. - ANSWER ✓ D

Which of the following is a password security weakness?
A) Users are assigned passwords when accounts are created, but do not change
them.
B) Users have accounts on several systems with different passwords.
C) Users write down their passwords on a note paper, and carry it with them.
D) Users select passwords that are not part of an online password dictionary. -
ANSWER ✓ A

To prevent invalid data input, a bank added an extra number at the end of each
account number and subjected the new number to an algorithm. This technique is
known as:
A) A validation check.
B) check digit verification.
C) A dependency check.
D) A format check. - ANSWER ✓ B

Why do Certificate Authority (CA) play an important role in a company's
information security management?
A) Using a CA is required by SOX in managing information security.
B) A CA is responsible to generate session keys for encryption purposes.
C) Most companies use CA to manage their employees public keys.
D) CA creates and maintains both the public and private keys for a company's
employees. - ANSWER ✓ C

When computer programs or files can be accessed from terminals, users should be
required to enter a(n):
A) Parity check
. B) Password as a personal identification code.
C) Check digit.
D) Echo check. - ANSWER ✓ B

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SmartscoreAaron Chicago State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
34
Member since
1 year
Number of followers
3
Documents
2956
Last sold
6 days ago
SMARTSCORES LIBRARY

Get top-tier academic support for Psychology, Nursing, Business, Engineering, HRM, Math, and more. Our team of professional tutors delivers high-quality homework, quiz, and exam assistance—ensuring scholarly excellence and grade-boosting results. Trust our collaborative expertise to help you succeed in any course at U.S.A Institutions.

3.8

4 reviews

5
2
4
1
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions