Exam 3: Security Part I: Auditing Operating Systems and Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Electronic data interchange translation software interfaces with the sending firm and the value added network.

Free
(True/False)
4.9/5
(39)
Correct Answer:
Verified

False

What is a seal of assurance?

Free
(Essay)
4.8/5
(37)
Correct Answer:
Verified

In response to consumer demand for evidence that a web-based business is trustworthy,a number of trusted third-party organizations are offering seals of assurance that businesses can display on their website home pages.To legitimately bear the seal,the company must show that it complies with certain business practices,capabilities,and controls.Examples of seal are: Better Business Bureau (BBB),TRUSTe,Veri-Sign,Inc.,International Computer Security Association (ICSA),AICPA/CICA WebTrust,and AICPA/CICA SysTrust.

A bus topology is less costly to install than a ring topology.

Free
(True/False)
4.9/5
(47)
Correct Answer:
Verified

True

Operating system controls are of interest to system professionals but should not concern accountants and auditors.

(True/False)
4.8/5
(36)

Which of the following is not a test of access controls?

(Multiple Choice)
4.9/5
(46)

Describe two ways that passwords are used to authorize and validate messages in the electronic data interchange environment.

(Essay)
4.9/5
(37)

Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.

(True/False)
4.9/5
(36)

Only two types of motivation drive DoS attacks: 1)to punish an organization with which the perpetrator had a grievance; and 2)to gain bragging rights for being able to do it.

(True/False)
4.9/5
(40)

Describe two tests of controls that would provide evidence that the database management system is protected against unauthorized access attempts.

(Essay)
4.9/5
(30)

Describe three ways in which IPS can be used to protect against DDoS Attacks?

(Essay)
4.9/5
(32)

List three methods of controlling unauthorized access to telecommunication messages.

(Essay)
4.9/5
(41)

What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?

(Multiple Choice)
4.7/5
(39)

Packet switching

(Multiple Choice)
4.9/5
(30)

What is a digital signature?

(Essay)
4.8/5
(29)

Discuss the public key encryption technique.

(Essay)
4.9/5
(36)

Briefly define an operating system.

(Essay)
4.9/5
(40)

What can be done to defeat a DDoS Attack?

(Essay)
4.8/5
(38)

In a star topology,when the central site fails

(Multiple Choice)
4.8/5
(34)

Explain how smurf attacks can be controlled.

(Essay)
4.8/5
(34)

Discuss the private key encryption technique and its shortcomings.

(Essay)
4.8/5
(42)
Showing 1 - 20 of 143
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)