Exam 3: Auditing Operating Systems and Networks
Exam 1: Auditing and Internal Control100 Questions
Exam 2: Auditing IT Governance Controls91 Questions
Exam 3: Auditing Operating Systems and Networks105 Questions
Exam 4: Auditing Database Systems100 Questions
Exam 5: Systems Development and Program Change Activities94 Questions
Exam 6: Transaction Processing and Financial Reporting Systems Overview98 Questions
Exam 7: Computer Assisted Audit Tools and Techniques82 Questions
Exam 8: Data Structures and Caatts for Data Extraction81 Questions
Exam 9: Auditing the Revenue Cycle97 Questions
Exam 10: Auditing the Expenditure Cycle100 Questions
Exam 11: Enterprise Resource Planning Systems90 Questions
Exam 12: Business Ethics, Fraud, and Fraud Detection84 Questions
Select questions type
What is deep packet inspection?
Free
(Essay)
4.9/5
(43)
Correct Answer:
DPI is a technique that searches individual network packets for protocol non-compliance and can identify and classify malicious packets based on a database of known attack signatures.
What can be done to defeat a DDoS Attack?
Free
(Essay)
4.9/5
(41)
Correct Answer:
Intrusion Prevention Systems (IPS) that employ deep packet inspection (DPI) are a countermeasure to DDoS attacks.
In a hierarchical topology, network nodes communicate with each other via a central host computer.
(True/False)
4.8/5
(34)
IP spoofing is a form of masquerading to gain unauthorized access to a Web server.
(True/False)
4.9/5
(42)
All of the following techniques are used to validate electronic data interchange transactions except
(Multiple Choice)
4.8/5
(30)
Network communication poses some special types of risk for a business. What are the two broad areas of concern? Explain.
(Essay)
4.8/5
(41)
What is an operating system? What does it do? What are operating system control objectives?
(Essay)
4.8/5
(39)
In an electronic data interchange (EDI) environment, when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table, the auditor is testing which audit objective?
(Multiple Choice)
4.9/5
(34)
Which of the following is considered an unintentional threat to the integrity of the operating system?
(Multiple Choice)
4.8/5
(29)
The operating system performs all of the following tasks except
(Multiple Choice)
4.8/5
(43)
Only two types of motivation drive DoS attacks: 1) to punish an organization with which the perpetrator had a grievance; and 2) to gain bragging rights for being able to do it.
(True/False)
4.8/5
(36)
A worm is software program that replicates itself in areas of idle memory until the system fails.
(True/False)
4.8/5
(37)
Showing 1 - 20 of 105
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)