Exam 16: IT Controls : Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Explain the concept of discretionary access privileges.

(Essay)
4.9/5
(47)

Describe one benefit of using a call-back device.

(Essay)
4.8/5
(35)

The operating system performs all of the following tasks except

(Multiple Choice)
4.8/5
(34)

An integrated group of programs that supports the applications and facilitates their access to specified resources is called a (an)

(Multiple Choice)
4.9/5
(39)

Which is not a biometric device?

(Multiple Choice)
4.7/5
(46)

A software program that allows access to a system without going through the normal logon procedures is called a

(Multiple Choice)
5.0/5
(38)

What is deep packet inspection?

(Essay)
4.7/5
(37)

What is event monitoring?

(Essay)
5.0/5
(31)

Access controls protect databases against destruction,loss or misuse through unauthorized access.

(True/False)
4.9/5
(35)

The database management system controls access to program files.

(True/False)
4.8/5
(31)

Which of the following is considered an unintentional threat to the integrity of the operating system?

(Multiple Choice)
4.7/5
(25)

All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except

(Multiple Choice)
4.9/5
(27)

One purpose of a database system is the easy sharing of data.But this ease of sharing can also jeopardize security.Discuss at least three forms of access control designed to reduce this risk.

(Essay)
4.8/5
(29)

Explain how smurf attacks can be controlled.

(Essay)
4.9/5
(31)

Many techniques exist to reduce the likelihood and effects of data communication hardware failure.One of these is

(Multiple Choice)
4.9/5
(37)

When creating and controlling backups for a sequential batch system,

(Multiple Choice)
4.8/5
(35)

In a direct access file system

(Multiple Choice)
4.8/5
(39)

Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating subschemas.

(True/False)
4.9/5
(31)

What are some typical problems with passwords?

(Essay)
4.8/5
(27)

When auditors examine and test the call-back feature,they are testing which audit objective?

(Multiple Choice)
4.9/5
(47)
Showing 61 - 80 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)