AFM341 Final: Chapter 12 Study Questions

64 views10 pages

Document Summary

What is the director most likely preparing: internal control policy, system hardware policy, system security policy, disaster recovery plan, supply chain management policy, a message digest is the result of hashing. No changes were made to the accounts payable system at that time. Chapter 12 t or f: the fraud triangle includes incentive , opportunity and an attitude to rationalize the fraud. Answer: true: the goal of information security management is to maintain confidentiality, integrity and availability of a firm"s information. Answer: true: encryption is a preventive control ensuring data confidentiality and privacy during transmission and for storage. Answer: true: asymmetric-key encryption is suitable for encrypting large data sets or messages. Answer: false: key distribution and key management are problematic under the symmetric -key encryption. Answer: true: the symmetric-key encryption method is used to authenticate users . Answer: false: a certificate authority (ca) issues digital certificates to bond the subscriber with a public key and a private key.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents

Related Questions