Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Page 11 of 13 Take Home Problem Set 82 Fall 2017 is an effective electronic acce

ID: 2589325 • Letter: P

Question

Page 11 of 13 Take Home Problem Set 82 Fall 2017 is an effective electronic access control for an on-line-real-time hotel reservation computer system? L Restricted access to the hotels front desk area. t. The existence of a hot site to be used in the event of disaster recovery being required. A system o, passwords to allow access to the system (passwords are changed on a regular basis) IV. A firewall that prevents unauthorized access to the network. a. and rv only. b. II. I", and only. c. 1 and ill only. d. 1 and Ill only. Your 18. Which of the following represents the procedure managers use to identify whether the company has information that unauthorized individuals want, how these individuals could obtain the information, the value of the information, and the probability of unauthorized access occurring? a. Disaster recovery plan assessment. b. Systems assessment c. Risk assessment. d. Test of controls Your Answer: Which of the following statements presents an example of a general control for a computerized system? a. Creating hash totals from Social Security numbers for the weekly payroll. b. Restricting entry of accounts payable transactions to only authorized users. c. Restricting access to the computer center by use of biometric devices 19. d. Limiting entry of sales transactions to only valid credit customers Your Answer:

Explanation / Answer

17 III and IV only/III. A system of passwords to allow access to the system (passwords are changed on a regular basis). IV. A firewall that prevents unauthorized access to the network./Passwords and firewalls are both examples of electronic access controls. 18 C Risk Assessment 19 C Restricting access to the computer center by use of biometric devices 20 d A denial of service attack 1. No written backup. 2. No written disaster recovery plan. 3. Backups are not done on a regular basis. 4. Restoration of backups is not tested.