Prevention of disclosure of information to unauthorized persons is __________ A. Confidentiality
B. Integrity
C. Availability
D. None of the above

1 Answer

Answer :

A. Confidentiality

Related questions

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : a) Confidentiality

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : A) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : b) Integrity

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : B) Integrity

Description : Who must initially determine what level of damage would occur to information if unauthorized disclosure of the information occurred?

Last Answer : The Original Classification Authority

Description : What Administrative, civil, or criminal sanctions may be imposed if there is an unauthorized disclosure (UD) of CUI?

Last Answer : TRUE

Description : If a professional accountant is billing an audit client a number of hours greater than those actually worked, which of the following fundamental principles is likely violated? a. Objectivity b. Integrity c. Professional due care d. Confidentiality

Last Answer : Integrity

Description : Which fundamental principle is seriously threatened by an engagement that is compensated based on the net proceeds on loans received by the client from a commercial bank? a. Integrity b. Objectivity c. Professional behavior d. Confidentiality

Last Answer : Objectivity

Description : A professional accountant is likened to a prudent father to his son. This relates to what fundamental principle? a. Professional competence and due care b. Confidentiality c. Integrity d. Objectivity

Last Answer : Professional competence and due care

Description : There are fundamental principles that the professional accountant has to observe when performing assurance engagements. The requirement of which principle is of particular importance in an assurance ... the intended user? a. Integrity b. Confidentiality c. Professional competence d. Objectivity

Last Answer : Objectivity

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : The goal of corporate governance and business ethics education is to: A. Teach students their professional accountability and to uphold their personal B. Integrity to society. C. Change ... standards by which corporate professionals must operate. E. Increase the workload for accounting students

Last Answer : C. Change the way in which ethics is taught to students.

Description : The goal of corporate governance and business ethics education is to: A. Teach students their professional accountability and to uphold their personal Integrity to society. B. Change ... standards by which corporate professionals must operate. D. Increase the workload for accounting students.

Last Answer : C. Create more ethics standards by which corporate professionals must operate.

Description : The Water (Prevention and Control of Pollution) Act was enacted in the year: A. 1986 B. 1974 C. 1994 D. 1975

Last Answer : B. 1974

Description : The Water (Prevention and Control of Pollution) Act was enacted in the year: A. 1986 B. 1974 C. 1994 D. 1975

Last Answer : B. 1974

Description : The Air (Prevention and Control of Pollution) Act was enacted in the year: A. 1981 B. 1996 C. 2000 D. 1974

Last Answer : A. 1981

Description : Unemployment that arises due to regional occupational pattern of job vacancies, which does not match the pattern of workers availability and suitability, is known as: A. Frictional unemployment B. Structural unemployment C. Cyclical unemployment D. Demand pull unemployment

Last Answer : B. Structural unemployment

Description : .Which of the following statements are true about labour idle time? A. Labour idle time variance is not caused by non-availability of raw material B. Labour idle time variance is measured as : Abnormal ... hourly rate C. Labour idle time variance is always unfavorable or adverse D. All of the above

Last Answer : C. Labour idle time variance is always unfavorable or adverse

Description : Karen is studying the potential for selling her company's products in China. As part of her analysis, she is assessing the number, types and availability of wholesalers and retailers. Karen is ... C. Social and cultural norms D. Distribution structure E. Legal and political constraints

Last Answer : D. Distribution structure

Description : Consumer expenditures are affected by ________. A. Savings B. Debt C. Credit availability D. All of the above E. None of the above

Last Answer : D. All of the above

Description : Palagiarism is unauthorized use of another person's copyright material without acknowledgment: A. Correct B. Incorrect

Last Answer : B. Incorrect

Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These

Last Answer : a) Firewall

Description : By security in e-Commerce we mean (i) Protecting an organization's data resource from unauthorized access (ii)Preventing disasters from happening (iii) Authenticating messages received by an organization (iv) Protecting messages sent on ... a. i, ii b. ii, iii c. iii, iv d. i, iii, iv

Last Answer : It's D

Description : In IT, means that the data available in the database is both accurate and consistent. (1) Data Security (2) Data Availability (3) Data Binding (4) Data Integrity

Last Answer : Data Integrity

Description : The association clause of a public company must be signed by: A. 10 persons B. 12 persons C. 7 persons D. 5 persons

Last Answer : C. 7 persons

Description : Which of the following person do not fall under the category of persons of unsound mind? A. Drunkards B. Lunatics C. Idiots D. Blind person.

Last Answer : D. Blind person.

Description : Which of the following persons are not competent to contract? A. Minor B. Person disqualified by law C. Person of unsound mind D. All of the above

Last Answer : D. All of the above

Description : Which of the following persons can perform the contract? A. Promisor alone B. Legal representative of promisor C. Agent of the promisor D. All of them

Last Answer : D. All of them

Description : Which one of the following categories of persons is not treated at par so far as the availability of Fundamental Rights is concerned? (1) Members of the armed forces (2) Members of ... Members of the forces employed in connection with the communication systems set up for maintenance of public order

Last Answer : a) Members of the armed forces Explanation: Members of Armed Forces are not treated at par so far as the availability of Fundamental Rights is concerned.

Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking

Last Answer : b) disclosure

Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking

Last Answer : b) disclosure

Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking

Last Answer : b) disclosure

Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking

Last Answer : b) disclosure

Description : Which of the following statements concerning a CPA's disclosure of confidential client information is ordinarily correct? a. Disclosure should not be made even if such disclosure will protect the CPA's ... consent of the client. d. Disclosure may be made to any government agency without subpoena.

Last Answer : Disclosure may be made to any party on consent of the client.

Description : Corporate governance is concerned with: A. Executive remuneration, disclosure of information, auditing and accounting procedures, and organizations' management structures B. Elections to the board of directors C. Relationships with national governments D. Corporate-level strategy

Last Answer : Executive remuneration, disclosure of information, auditing and accounting procedures, and organizations' management structures

Description : Corporate governance is concerned with: A. Executive remuneration, disclosure of information, auditing and accounting procedures, and organizations' management structures B. Elections to the board of directors C. Relationships with national governments D. Corporate-level strategy

Last Answer : Relationships with national governments

Description : Corporate governance is concerned with: A. Executive remuneration, disclosure of information, auditing and accounting procedures, and organizations' management structures B. Elections to the board of directors C. Relationships with national governments D. Corporate-level strategy

Last Answer : Relationships with national governments

Description : How the medical assistant can ensure confidentiality of patient information during a visit to health care facility?

Last Answer : What is the answer ?

Description : Which of the following is one of the limitations of an audit? a. Nature of evidence obtained b. Inadequacy of the accounting records c. Confidentiality of information d. Scope limitations imposed by the entity

Last Answer : Nature of evidence obtained

Description : A CPA in public practice shall not disclose any confidential client information without the specific consent of the client. The confidentiality rule is violated if CPA disclosed information without client' ... s largest stockholder. d. Complaint filed with the trial board of the Board of Accountancy

Last Answer : Request by client's largest stockholder.

Description : This fundamental principle requires a CPA not to use or disclose information acquired during the course of performing professional services without proper and specific authority. a. Objectivity. b. Professional Behavior. c. Professional Competence and Due care. d. Confidentiality

Last Answer : Confidentiality

Description :  __________ is software that blocks unauthorized users from connecting to your computer. A. Firewall B. Quick lauch C. OneLogin D. Centrify

Last Answer : A. Firewall 

Description : Unauthorized communication of information means and include:- a) To which he is not authorized to have access. b) Which he is not authorized to keep in his personal custody c) Both A & B d) None of these

Last Answer : c) Both A & B

Description : Rule 11 of CCS Conduct rules explained a) Evidence before committee b) Unauthorized communication of information c) Election d) Gift

Last Answer : b) Unauthorized communication of information