Multiple choice review.
1. Carter suggested a four-part taxonomy of computer crime, comprising:
a. Technical, physical, administrative, and software crime.
b. Target, instrumentality, incidental, and associated.
c. Preventive, detective, corrective, and coercive.
d. Motivation, expectancy, valence, and instrumentality.
2. According to the U.S. Department of Justice, which of the following is defined as any illegal act for which knowledge of computer technology is used to commit the offense?
a. Fraud
b. Intrusion
c. Information theft
d. Malicious software
3. The largest threat to a company’s information systems comes from:
a. Hackers.
b. Terrorists.
c. Organized crime.
d. Insiders.
4. The three fundamental principles that guide the development and implementation of IT controls are:
a. Physical, technical, and administrative.
b. Effectiveness, efficiency, and compliance.
c. Confidentiality, availability, and data integrity.
d. Preventive, detective, and corrective.
5. In the CoBIT accountability framework, disclosures about information governance control flow from ___ to ___.
a. IT and information security management; board of directors
b. Board of directors; stakeholders
c. External audit; audit committee
d. Audit committee, stakeholders
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.