Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : a) Confidentiality
Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity
Last Answer : A) Confidentiality
Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : b) Integrity
Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity
Last Answer : ii) Integrity
Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity
Last Answer : B) Integrity
Description : Who must initially determine what level of damage would occur to information if unauthorized disclosure of the information occurred?
Last Answer : The Original Classification Authority
Description : The following information's are exemption from disclosure a) Information disclosure of which would prejudicially affect the sovereignty and integrity of India b) Information which has been expressly forbidden ... of which would harm the competitive position of third party. e) All the above
Last Answer : e) All the above
Description : What Administrative, civil, or criminal sanctions may be imposed if there is an unauthorized disclosure (UD) of CUI?
Last Answer : TRUE
Description : Which among the following is correct about goals in cryptography: a) Confidentiality - Only an authorized recipient should be able to extract the contents of the message from its encrypted form. Resulting from steps ... not be able to deny sending the message e) None of These f) All of the Above
Last Answer : f) All of the Above
Description : If a professional accountant is billing an audit client a number of hours greater than those actually worked, which of the following fundamental principles is likely violated? a. Objectivity b. Integrity c. Professional due care d. Confidentiality
Last Answer : Integrity
Description : Which fundamental principle is seriously threatened by an engagement that is compensated based on the net proceeds on loans received by the client from a commercial bank? a. Integrity b. Objectivity c. Professional behavior d. Confidentiality
Last Answer : Objectivity
Description : A professional accountant is likened to a prudent father to his son. This relates to what fundamental principle? a. Professional competence and due care b. Confidentiality c. Integrity d. Objectivity
Last Answer : Professional competence and due care
Description : There are fundamental principles that the professional accountant has to observe when performing assurance engagements. The requirement of which principle is of particular importance in an assurance ... the intended user? a. Integrity b. Confidentiality c. Professional competence d. Objectivity
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Last Answer : d. All the above
Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens
Last Answer : d)It is used to ensure data corruption does not happens
Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above
Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files
Description : The goal of corporate governance and business ethics education is to: A. Teach students their professional accountability and to uphold their personal B. Integrity to society. C. Change ... standards by which corporate professionals must operate. E. Increase the workload for accounting students
Last Answer : C. Change the way in which ethics is taught to students.
Description : The goal of corporate governance and business ethics education is to: A. Teach students their professional accountability and to uphold their personal Integrity to society. B. Change ... standards by which corporate professionals must operate. D. Increase the workload for accounting students.
Last Answer : C. Create more ethics standards by which corporate professionals must operate.
Description : The Water (Prevention and Control of Pollution) Act was enacted in the year: A. 1986 B. 1974 C. 1994 D. 1975
Last Answer : B. 1974
Description : The Air (Prevention and Control of Pollution) Act was enacted in the year: A. 1981 B. 1996 C. 2000 D. 1974
Last Answer : A. 1981
Description : Unemployment that arises due to regional occupational pattern of job vacancies, which does not match the pattern of workers availability and suitability, is known as: A. Frictional unemployment B. Structural unemployment C. Cyclical unemployment D. Demand pull unemployment
Last Answer : B. Structural unemployment
Description : .Which of the following statements are true about labour idle time? A. Labour idle time variance is not caused by non-availability of raw material B. Labour idle time variance is measured as : Abnormal ... hourly rate C. Labour idle time variance is always unfavorable or adverse D. All of the above
Last Answer : C. Labour idle time variance is always unfavorable or adverse
Description : Karen is studying the potential for selling her company's products in China. As part of her analysis, she is assessing the number, types and availability of wholesalers and retailers. Karen is ... C. Social and cultural norms D. Distribution structure E. Legal and political constraints
Last Answer : D. Distribution structure
Description : Consumer expenditures are affected by ________. A. Savings B. Debt C. Credit availability D. All of the above E. None of the above
Last Answer : D. All of the above
Description : As a resolution of the conflict in the application of fundamental principles, the auditor, after considering the ethical issues and relevant facts may do any of the following, ... from, the relevant professional body without breaching confidentiality if significant conflict cannot be resolved.
Last Answer : Must immediately resign from the engagement or the employing entity
Description : Palagiarism is unauthorized use of another person's copyright material without acknowledgment: A. Correct B. Incorrect
Last Answer : B. Incorrect
Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These
Last Answer : a) Firewall
Description : By security in e-Commerce we mean (i) Protecting an organization's data resource from unauthorized access (ii)Preventing disasters from happening (iii) Authenticating messages received by an organization (iv) Protecting messages sent on ... a. i, ii b. ii, iii c. iii, iv d. i, iii, iv
Last Answer : It's D
Description : In IT, means that the data available in the database is both accurate and consistent. (1) Data Security (2) Data Availability (3) Data Binding (4) Data Integrity
Last Answer : Data Integrity
Description : The association clause of a public company must be signed by: A. 10 persons B. 12 persons C. 7 persons D. 5 persons
Last Answer : C. 7 persons
Description : Which of the following person do not fall under the category of persons of unsound mind? A. Drunkards B. Lunatics C. Idiots D. Blind person.
Last Answer : D. Blind person.
Description : Which of the following persons are not competent to contract? A. Minor B. Person disqualified by law C. Person of unsound mind D. All of the above
Description : Which of the following persons can perform the contract? A. Promisor alone B. Legal representative of promisor C. Agent of the promisor D. All of them
Last Answer : D. All of them
Description : Which one of the following categories of persons is not treated at par so far as the availability of Fundamental Rights is concerned? (1) Members of the armed forces (2) Members of ... Members of the forces employed in connection with the communication systems set up for maintenance of public order
Last Answer : a) Members of the armed forces Explanation: Members of Armed Forces are not treated at par so far as the availability of Fundamental Rights is concerned.
Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking
Last Answer : b) disclosure
Description : Which of the following statements concerning a CPA's disclosure of confidential client information is ordinarily correct? a. Disclosure should not be made even if such disclosure will protect the CPA's ... consent of the client. d. Disclosure may be made to any government agency without subpoena.
Last Answer : Disclosure may be made to any party on consent of the client.
Description : Corporate governance is concerned with: A. Executive remuneration, disclosure of information, auditing and accounting procedures, and organizations' management structures B. Elections to the board of directors C. Relationships with national governments D. Corporate-level strategy
Last Answer : Executive remuneration, disclosure of information, auditing and accounting procedures, and organizations' management structures
Last Answer : Relationships with national governments
Description : How the medical assistant can ensure confidentiality of patient information during a visit to health care facility?
Last Answer : What is the answer ?
Description : Which of the following is one of the limitations of an audit? a. Nature of evidence obtained b. Inadequacy of the accounting records c. Confidentiality of information d. Scope limitations imposed by the entity
Last Answer : Nature of evidence obtained
Description : A CPA in public practice shall not disclose any confidential client information without the specific consent of the client. The confidentiality rule is violated if CPA disclosed information without client' ... s largest stockholder. d. Complaint filed with the trial board of the Board of Accountancy
Last Answer : Request by client's largest stockholder.
Description : This fundamental principle requires a CPA not to use or disclose information acquired during the course of performing professional services without proper and specific authority. a. Objectivity. b. Professional Behavior. c. Professional Competence and Due care. d. Confidentiality
Last Answer : Confidentiality
Description : __________ is software that blocks unauthorized users from connecting to your computer. A. Firewall B. Quick lauch C. OneLogin D. Centrify
Last Answer : A. Firewall
Description : Unauthorized communication of information means and include:- a) To which he is not authorized to have access. b) Which he is not authorized to keep in his personal custody c) Both A & B d) None of these
Last Answer : c) Both A & B
Description : Rule 11 of CCS Conduct rules explained a) Evidence before committee b) Unauthorized communication of information c) Election d) Gift
Last Answer : b) Unauthorized communication of information