Application Controls and Organizational Framework Quiz

LikableCobalt avatar
LikableCobalt
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What type of attack takes advantage of vulnerabilities in poorly coded web application software?

SQL injection attack

What can an attacker do when exploiting an input validation error in a web application?

Accessing the database, planting malicious code, or accessing other systems on the network

Why are large web applications using databases most vulnerable to SQL injection attacks?

They often fail to properly validate or filter user-entered data

How does the security of a firm's information system and data get affected by its people, organization, and technology?

<p>It becomes vulnerable due to lack of governance and technological advancements</p> Signup and view all the answers

Which of the following is an analysis that rates the likelihood of a security incident occurring and its cost?

<p>Risk assessment</p> Signup and view all the answers

Where would a statement ranking information risks and identifying security goals be included?

<p>Security policy</p> Signup and view all the answers

Which of the following components defines acceptable uses of a firm's information resources and computing equipment?

<p>Administrative</p> Signup and view all the answers

In the context of an organizational framework for security and control, where would a business continuity plan fall?

<p>Business continuity plan</p> Signup and view all the answers

What is the term for e-mail messages that mimic the e-mail messages of a legitimate business?

<p>Phishing</p> Signup and view all the answers

What are evil twins in the context of information systems vulnerability?

<p>Computers that fraudulently access a website or network using the IP address and identification of an authorized computer</p> Signup and view all the answers

What does pharming involve in the context of information systems vulnerability?

<p>Setting up fake websites to ask users for confidential information</p> Signup and view all the answers

Which method involves using e-mails to threaten or harass individuals in the context of information systems vulnerability?

<p>Cyberwarfare</p> Signup and view all the answers

Which of the following best describes application controls?

<p>Can be classified as input controls, processing controls, and output controls</p> Signup and view all the answers

Which of the following statements accurately describes application controls?

<p>They apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment</p> Signup and view all the answers

What do application controls primarily focus on?

<p>Ensuring the security and control of computer programs and data files throughout the organization</p> Signup and view all the answers

What is the main purpose of application controls?

<p>Ensuring the security and integrity of data during input, processing, and output stages</p> Signup and view all the answers

More Quizzes Like This

CIS Application Controls: Overview
10 questions
ERP System Controls
15 questions

ERP System Controls

NonViolentBeige7156 avatar
NonViolentBeige7156
Use Quizgecko on...
Browser
Browser