Exam 3: Auditing Operating Systems and Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following statements is correct? TCP/IP

(Multiple Choice)
4.8/5
(36)

What are some typical problems with passwords?

(Essay)
4.8/5
(29)

The bus topology connects the nodes in parallel.

(True/False)
4.7/5
(46)

FTP

(Multiple Choice)
4.9/5
(42)

Explain the function of the two parts of the TCP/IP protocol.

(Essay)
4.9/5
(48)

The client-server model can only be applied to ring and star topologies.

(True/False)
4.8/5
(39)

HTTP

(Multiple Choice)
4.9/5
(35)

Passwords are secret codes that users enter to gain access to systems. Security can be compromised by all of the following except

(Multiple Choice)
4.9/5
(44)

A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.

(True/False)
4.7/5
(37)

A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.

(True/False)
4.9/5
(40)

A distributed denial of service (DDoS) attack

(Multiple Choice)
4.9/5
(32)

Computer viruses usually spread throughout the system before being detected.

(True/False)
4.9/5
(43)

When auditors examine and test the call-back feature, they are testing which audit objective?

(Multiple Choice)
4.9/5
(39)

A software program that allows access to a system without going through the normal logon procedures is called a

(Multiple Choice)
4.9/5
(44)

Describe the basic differences between the star, ring, and bus topologies.

(Essay)
4.8/5
(35)

A digital signature is a digital copy of the sender's actual signature that cannot be forged.

(True/False)
4.9/5
(42)

A formal log-on procedure is the operating system's first line of defense. Explain how this works.

(Essay)
4.9/5
(37)

All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except

(Multiple Choice)
4.9/5
(34)

All of the following will reduce the exposure to computer viruses except

(Multiple Choice)
5.0/5
(35)

A digital signature is

(Multiple Choice)
4.9/5
(33)
Showing 41 - 60 of 105
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)