Exam 3: Auditing Operating Systems and Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Because of network protocols, users of networks built by different manufacturers are able to communicate and share data.

(True/False)
4.8/5
(45)

The audit trail for electronic data interchange transactions is stored on magnetic media.

(True/False)
4.9/5
(34)

Many techniques exist to reduce the likelihood and effects of data communication hardware failure. One of these is

(Multiple Choice)
4.7/5
(34)

The message authentication code is calculated by the sender and the receiver of a data transmission.

(True/False)
4.8/5
(41)

Discuss the changing motivation behind a denial of service attack.

(Essay)
4.8/5
(33)

In determining whether a system is adequately protected from attacks by computer viruses, all of the following policies are relevant except

(Multiple Choice)
4.8/5
(34)

Explain the concept of discretionary access privileges.

(Essay)
4.8/5
(38)

Discuss the public key encryption technique.

(Essay)
4.8/5
(45)

The request-response technique should detect if a data communication transmission has been diverted.

(True/False)
4.8/5
(35)

Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.

(True/False)
4.8/5
(25)

Explain a smurf attack.

(Essay)
4.8/5
(36)

Explain how SYN Flood attacks can be controlled.

(Essay)
4.9/5
(38)

A firewall is a hardware partition designed to protect networks from power surges.

(True/False)
4.8/5
(37)

In an electronic data interchange environment, the audit trail

(Multiple Choice)
4.7/5
(35)

Polling is one technique used to control data collisions.

(True/False)
4.7/5
(45)

In an electronic data interchange environment, customers routinely

(Multiple Choice)
4.7/5
(37)

Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called

(Multiple Choice)
4.9/5
(34)

Discuss the key features of the one-time password technique:

(Essay)
4.8/5
(38)

A network topology is the physical arrangement of the components of the network.

(True/False)
4.7/5
(31)

What is a virus?

(Short Answer)
4.9/5
(37)
Showing 21 - 40 of 105
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)