Exam 3: Security Part I: Auditing Operating Systems and Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe one benefit of using a call-back device.

(Essay)
4.8/5
(45)

An IP Address:

(Multiple Choice)
4.8/5
(36)

When auditors examine and test the call-back feature,they are testing which audit objective?

(Multiple Choice)
4.8/5
(42)

Audit objectives for communications controls include all of the following except

(Multiple Choice)
4.8/5
(41)

In a computerized environment,the audit trail log must be printed onto paper documents.

(True/False)
4.8/5
(37)

All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except

(Multiple Choice)
4.8/5
(38)

A worm is software program that replicates itself in areas of idle memory until the system fails.

(True/False)
4.9/5
(39)

Which control will not reduce the likelihood of data loss due to a line error?

(Multiple Choice)
4.9/5
(32)

In a telecommunications environment,line errors can be detected by using an echo check.

(True/False)
4.9/5
(29)

The standard format for an e-mail address is DOMAIN NAME@USER NAME.

(True/False)
4.9/5
(43)

The client-server model can only be applied to ring and star topologies.

(True/False)
4.7/5
(40)

IP spoofing is a form of masquerading to gain unauthorized access to a Web server.

(True/False)
4.8/5
(30)

A smurf attack involves three participants: a zombie,an intermediary,and the victim.

(True/False)
5.0/5
(41)

Discuss the changing motivation behind a Denial of Service Attack

(Essay)
4.9/5
(42)

The message authentication code is calculated by the sender and the receiver of a data transmission.

(True/False)
4.8/5
(39)

Advance encryption standard (AES)is

(Multiple Choice)
4.7/5
(43)

Which of the following statements is correct?

(Multiple Choice)
4.9/5
(39)

A formal log-on procedure is the operating system's first line of defense.Explain how this works.

(Essay)
4.8/5
(42)

A virtual private network:

(Multiple Choice)
4.7/5
(42)

A star topology is appropriate

(Multiple Choice)
4.8/5
(48)
Showing 21 - 40 of 143
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)