Exam 3: Auditing Operating Systems and Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

HTML

(Multiple Choice)
4.9/5
(36)

List three methods of controlling unauthorized access to telecommunication messages.

(Essay)
4.7/5
(38)

Discuss three techniques for breaching operating system controls.

(Essay)
4.8/5
(37)

Packet switching

(Multiple Choice)
4.9/5
(32)

Electronic data interchange translation software interfaces with the sending firm and the value added network.

(True/False)
4.8/5
(41)

A star topology is appropriate

(Multiple Choice)
4.7/5
(32)

Discuss the private key encryption technique and its shortcomings.

(Essay)
4.8/5
(34)

Electronic data interchange customers may be given access to the vendor's data files.

(True/False)
4.8/5
(31)

Which method is most likely to detect unauthorized access to the system?

(Multiple Choice)
4.7/5
(40)

To preserve audit trails in a computerized environment, transaction logs are permanent records of transactions.

(True/False)
4.8/5
(34)

Which control will not reduce the likelihood of data loss due to a line error?

(Multiple Choice)
4.9/5
(38)

A value added network can detect and reject transactions by unauthorized trading partners.

(True/False)
4.7/5
(39)

Audit objectives for communications controls include all of the following except

(Multiple Choice)
4.8/5
(50)

The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.

(True/False)
4.7/5
(31)

In a computerized environment, the audit trail log must be printed onto paper documents.

(True/False)
5.0/5
(41)

Explain a distributed denial of service attack.

(Essay)
4.7/5
(40)

Network protocols fulfill all of the following objectives except

(Multiple Choice)
4.8/5
(34)

The more individuals that need to exchange encrypted data, the greater the chance that the key will become known to an intruder. To overcome this problem, private key encryption was devised.

(True/False)
5.0/5
(32)

Contrast a LAN and a WAN. Typically, who owns and maintains a WAN?

(Essay)
4.8/5
(32)

What are the three security objectives of audit trails? Explain.

(Essay)
4.8/5
(44)
Showing 81 - 100 of 105
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)