Questions from General Supply Chain


Q: Describe the relationship between security and control and recent U.S

Describe the relationship between security and control and recent U.S. government regulatory requirements and computer forensics.

See Answer

Q: Define general controls and describe each type of general control.

Define general controls and describe each type of general control.

See Answer

Q: Define application controls and describe each type of application control.

Define application controls and describe each type of application control.

See Answer

Q: Describe the function of risk assessment and explain how it is conducted

Describe the function of risk assessment and explain how it is conducted for information systems.

See Answer

Q: Define and describe the following: security policy, acceptable use policy

Define and describe the following: security policy, acceptable use policy, and identity management.

See Answer

Q: Explain how information systems auditing promotes security and control.

Explain how information systems auditing promotes security and control.

See Answer

Q: Name and describe three authentication methods.

Name and describe three authentication methods.

See Answer

Q: Describe the roles of firewalls, intrusion detection systems, and antivirus

Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security.

See Answer

Q: 1. How is GE changing its business strategy and business model

1. How is GE changing its business strategy and business model? What is the role of information technology in GE’s business? 2. On what business functions and level of decision making is GE focusing?...

See Answer

Q: Explain how encryption protects information.

Explain how encryption protects information.

See Answer