Exam 3: Auditing Operating Systems and Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Viruses rarely attach themselves to executable files.

(True/False)
5.0/5
(34)

A ping signal is used to initiate

(Multiple Choice)
4.8/5
(39)

All of the following are designed to control exposures from subversive threats except

(Multiple Choice)
4.9/5
(35)

What are network protocols? What functions do they perform?

(Essay)
4.8/5
(25)

Which of the following is true?

(Multiple Choice)
4.9/5
(37)

Which method will render useless data captured by unauthorized receivers?

(Multiple Choice)
4.8/5
(30)

The rules that make it possible for users of networks to communicate are called protocols.

(True/False)
4.7/5
(43)

A formal log-on procedure is the operating system's last line of defense against unauthorized access.

(True/False)
4.8/5
(45)

Operating system controls are of interest to system professionals but should not concern accountants and auditors.

(True/False)
4.7/5
(40)

Firewalls are

(Multiple Choice)
4.8/5
(33)

HTML tags are customized to delimit attributes, the content of which can be read and processed by computer applications.

(True/False)
4.8/5
(37)

A software program that replicates itself in areas of idle memory until the system fails is called a

(Multiple Choice)
4.8/5
(42)

Which of the following statements is correct? The client-server model

(Multiple Choice)
4.9/5
(38)

Explain a SYN flood attack.

(Essay)
4.8/5
(38)

Define and contrast digital certificate and digital signature.

(Essay)
4.8/5
(26)

A message that is made to look as though it is coming from a trusted source but is not is called

(Multiple Choice)
4.8/5
(33)

In a telecommunications environment, line errors can be detected by using an echo check.

(True/False)
4.9/5
(39)

To physically connect a workstation to a LAN requires a

(Multiple Choice)
4.8/5
(31)

Disguising message packets to look as if they came from another user and to gain access to the host's network is called spooling.

(True/False)
5.0/5
(34)

The most frequent victims of program viruses are microcomputers.

(True/False)
4.9/5
(49)
Showing 61 - 80 of 105
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)