Exam 3: Security Part I: Auditing Operating Systems and Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A message that is made to look as though it is coming from a trusted source but is not is called

(Multiple Choice)
4.7/5
(39)

All of the following will reduce the exposure to computer viruses except

(Multiple Choice)
4.8/5
(37)

HTML tags are customized to delimit attributes,the content of which can be read and processed by computer applications.

(True/False)
4.8/5
(40)

A distributed denial of service (DDoS)attack may take the form of a SYN flood but not a smurf attack.

(True/False)
4.8/5
(39)

Which one of the following statements is correct?

(Multiple Choice)
4.9/5
(39)

Discuss three techniques for breaching operating system controls.

(Essay)
4.8/5
(36)

Which is not a biometric device?

(Multiple Choice)
4.7/5
(40)

Network protocols fulfill all of the following objectives except

(Multiple Choice)
4.7/5
(43)

What is an operating system? What does it do? What are operating system control objectives?

(Essay)
4.8/5
(37)

Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called

(Multiple Choice)
4.8/5
(40)

The intermediary in a smurf attack is also a victim.

(True/False)
4.9/5
(37)

The rules that make it possible for users of networks to communicate are called protocols.

(True/False)
4.7/5
(39)

In an electronic data interchange environment,customers routinely

(Multiple Choice)
4.7/5
(34)

Explain a SYN Flood attack.

(Essay)
4.8/5
(29)

Explain the concept of discretionary access privileges.

(Essay)
4.7/5
(35)

Which method will render useless data captured by unauthorized receivers?

(Multiple Choice)
4.7/5
(36)

Contrast the Private Encryption Standard approach with the Public Key Encryption approach to controlling access to telecommunication messages.

(Essay)
4.7/5
(37)

In determining whether a system is adequately protected from attacks by computer viruses,all of the following policies are relevant except

(Multiple Choice)
4.9/5
(35)

HTTP

(Multiple Choice)
4.8/5
(30)

Audit objectives in the electronic data interchange (EDI)environment include all of the following except

(Multiple Choice)
4.9/5
(35)
Showing 41 - 60 of 143
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)