100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Chapter 9 Information Systems Controls for Systems ReliabilityPart 2: Confidentiality and Privacy £2.99   Add to cart

Exam (elaborations)

Chapter 9 Information Systems Controls for Systems ReliabilityPart 2: Confidentiality and Privacy

 2 views  0 purchase

Chapter 9 Information Systems Controls for Systems ReliabilityPart 2: Confidentiality and Privacy Accounting Information Systems 12Th Ed by Marshall B. Romney - Test Bank

Preview 2 out of 7  pages

  • January 2, 2024
  • 7
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
  • complete chapter 9
All documents for this subject (2)
avatar-seller
ExamsExpert
Accounting Information Systems, 12e (Romney/Steinbart)
Chapter 9 Information Systems Controls for Systems ReliabilityPart 2: Confidentiality and
Privacy

1) Concerning virtual private networks (VPN), which of the following is not true?
A) VPNs provide the functionality of a privately owned network using the Internet.
B) Using VPN software to encrypt information while it is in transit over the Internet in effect creates
private communication channels, often referred to as tunnels, which are accessible only to those parties
possessing the appropriate encryption and decryption keys.
C) The cost of the VPN software is much less than the cost of leasing or buying the infrastructure
(telephone lines, satellite links, communications equipment, etc.) needed to create a privately owned
secure communications network.
D) It is more expensive to reconfigure VPNs to include new sites than it is to add or remove the
corresponding physical connections in a privately owned network.
Answer: D
Page Ref: 264
Objective: Learning Objective 3
Difficulty : Moderate
AACSB: Analytic

2) Which of the following is not associated with asymmetric encryption?
A) No need for key exchange
B) Public keys
C) Private keys
D) Speed
Answer: D
Page Ref: 260
Objective: Learning Objective 3
Difficulty : Easy
AACSB: Analytic

3) The system and processes used to issue and manage asymmetric keys and digital certificates are
known as
A) asymmetric encryption.
B) certificate authority.
C) digital signature.
D) public key infrastructure.
Answer: D
Page Ref: 262
Objective: Learning Objective 3
Difficulty : Moderate
AACSB: Analytic




1
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

, 4) Which of the following describes one weakness of encryption?
A) Encrypted packets cannot be examined by a firewall.
B) Encryption protects the confidentiality of information while in storage.
C) Encryption protects the privacy of information during transmission.
D) Encryption provides for both authentication and non-repudiation.
Answer: A
Page Ref: 264
Objective: Learning Objective 3
Difficulty : Moderate
AACSB: Analytic

5) Using a combination of symmetric and asymmetric key encryption, Chris Kai sent a report to her
home office in Syracuse, New York. She received an email acknowledgement that the document had
been received and then, a few minutes later, she received a second email that indicated that the hash
calculated from the report differed from that sent with the report. This most likely explanation for this
result is that
A) the public key had been compromised.
B) the private key had been compromised.
C) the symmetric encryption key had been compromised.
D) the asymmetric encryption key had been compromised.
Answer: C
Page Ref: 261
Objective: Learning Objective 3
Difficulty : Difficult
AACSB: Analytic

6) Encryption has a remarkably long and varied history. The invention of writing was apparently soon
followed by a desire to conceal messages. One of the earliest methods, attributed to an ancient Roman
emperor, was the simple substitution of numbers for letters, for example A = 1, B = 2, etc. This is an
example of
A) a hashing algorithm.
B) symmetric key encryption.
C) asymmetric key encryption.
D) a public key.
Answer: B
Page Ref: 260
Objective: Learning Objective 3
Difficulty : Moderate
AACSB: Analytic

7) An electronic document that certifies the identity of the owner of a particular public key.
A) Asymmetric encryption
B) Digital certificate
C) Digital signature
D) Public key
Answer: B
Page Ref: 262
Objective: Learning Objective 3
Difficulty : Moderate
AACSB: Analytic
2
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ExamsExpert. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £2.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

80461 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£2.99
  • (0)
  Add to cart