Quiz 2 Fall 2011
Which of the following is an example of an output application control?
Product quantity is automatically multiplied by price.
Sales information is automatically recorded in both the transaction and semi-permanent data
Report column headers should be repeated on each page.
Birth year should not contain any alphabetic characters.
Which of the following is the first step that should be taken before implementing security actions?
Take a backup copy of all programs and data and store it off site.
Make an inventory of the types of information being used, stored or accessed.
Encrypt all of your information so that it can only be accessed by you.
Make sure that you have difficult to guess passwords for your systems.
Which of the following is a computer to which you connect, that in turn connects to the website
you wish to visit?
Which of the following attacks is the one most closely associated with downloading and installing
Denial of service
Zero day attacks
Viruses Question 5
A security buffer between a company’s private network and external networks is called a(n):
An intellectual work that is known only to a compa