Exam 3: Auditing Operating Systems and Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is deep packet inspection?

Free
(Essay)
4.9/5
(43)
Correct Answer:
Verified

DPI is a technique that searches individual network packets for protocol non-compliance and can identify and classify malicious packets based on a database of known attack signatures.

IP spoofing

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

B

What can be done to defeat a DDoS Attack?

Free
(Essay)
4.9/5
(41)
Correct Answer:
Verified

Intrusion Prevention Systems (IPS) that employ deep packet inspection (DPI) are a countermeasure to DDoS attacks.

In a hierarchical topology, network nodes communicate with each other via a central host computer.

(True/False)
4.8/5
(34)

In a ring topology

(Multiple Choice)
5.0/5
(35)

What is event monitoring?

(Essay)
4.8/5
(38)

IP spoofing is a form of masquerading to gain unauthorized access to a Web server.

(True/False)
4.9/5
(42)

All of the following techniques are used to validate electronic data interchange transactions except

(Multiple Choice)
4.8/5
(30)

Network communication poses some special types of risk for a business. What are the two broad areas of concern? Explain.

(Essay)
4.8/5
(41)

What is an operating system? What does it do? What are operating system control objectives?

(Essay)
4.8/5
(39)

In an electronic data interchange (EDI) environment, when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table, the auditor is testing which audit objective?

(Multiple Choice)
4.9/5
(34)

Which of the following is considered an unintentional threat to the integrity of the operating system?

(Multiple Choice)
4.8/5
(29)

An IP Address:

(Multiple Choice)
4.9/5
(42)

Discuss three sources of exposure (threats) to the operating system.

(Essay)
4.7/5
(39)

Which of the following statements is correct?

(Multiple Choice)
4.8/5
(33)

What are the auditor's concerns in testing EDI controls?

(Essay)
4.7/5
(28)

A virtual private network:

(Multiple Choice)
4.8/5
(33)

The operating system performs all of the following tasks except

(Multiple Choice)
4.8/5
(43)

Only two types of motivation drive DoS attacks: 1) to punish an organization with which the perpetrator had a grievance; and 2) to gain bragging rights for being able to do it.

(True/False)
4.8/5
(36)

A worm is software program that replicates itself in areas of idle memory until the system fails.

(True/False)
4.8/5
(37)
Showing 1 - 20 of 105
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)