Exam 16: IT Controls : Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A firewall is a hardware partition designed to protect networks from power surges.

(True/False)
4.8/5
(37)

Explain how the one-time password approach works.

(Essay)
4.8/5
(30)

Electronic data interchange translation software interfaces with the sending firm and the value added network.

(True/False)
4.9/5
(32)

All of the following techniques are used to validate electronic data interchange transactions except

(Multiple Choice)
4.9/5
(42)

In a computerized environment,the audit trail log must be printed onto paper documents.

(True/False)
4.7/5
(31)

The message authentication code is calculated by the sender and the receiver of a data transmission.

(True/False)
4.8/5
(43)

A formal log-on procedure is the operating system's last line of defense against unauthorized access.

(True/False)
4.9/5
(40)

Audit objectives for the database management system include all of the following except

(Multiple Choice)
4.8/5
(38)

All of the following are designed to control exposures from subversive threats except

(Multiple Choice)
4.8/5
(33)

Discuss three sources of exposure (threats)to the operating system.

(Essay)
4.8/5
(40)

In a telecommunications environment,line errors can be detected by using an echo check.

(True/False)
4.8/5
(40)

Subschemas are used to authorize user access privileges to specific data elements.

(True/False)
4.8/5
(40)

Audit trails cannot be used to

(Multiple Choice)
4.8/5
(41)

Explain how SYN Flood attacks can be controlled.

(Essay)
4.9/5
(33)

Advance encryption standard (AES)is

(Multiple Choice)
4.8/5
(32)

The most frequent victims of program viruses are microcomputers.

(True/False)
4.9/5
(33)

Contrast the Private Encryption Standard approach with the Public Key Encryption approach to controlling access to telecommunication messages.

(Essay)
4.9/5
(31)

A worm is software program that replicates itself in areas of idle memory until the system fails.

(True/False)
4.8/5
(44)

The request-response technique should detect if a data communication transmission has been diverted.

(True/False)
4.8/5
(34)

The database attributes that individual users have permission to access are defined in

(Multiple Choice)
4.7/5
(40)
Showing 41 - 60 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)