Exam 3: Security Part I: Auditing Operating Systems and Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Disguising message packets to look as if they came from another user and to gain access to the host's network is called spooling.

(True/False)
4.9/5
(40)

In an electronic data interchange (EDI)environment,when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table,the auditor is testing which audit objective?

(Multiple Choice)
4.8/5
(36)

Explain how the one-time password approach works.

(Essay)
4.9/5
(36)

The audit trail for electronic data interchange transactions is stored on magnetic media.

(True/False)
4.8/5
(30)

What is a digital certificate?

(Essay)
4.8/5
(39)

The request-response technique should detect if a data communication transmission has been diverted.

(True/False)
4.8/5
(43)

In an electronic data interchange environment,the audit trail

(Multiple Choice)
4.8/5
(37)

Which of the following deal with transaction legitimacy?

(Multiple Choice)
4.8/5
(45)

Discuss three sources of exposure (threats)to the operating system.

(Essay)
4.8/5
(40)

Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology,the central computer manages and controls data communications among the network nodes.

(Multiple Choice)
4.8/5
(39)

What are biometric devices?

(Essay)
4.8/5
(32)

A digital signature is a digital copy of the sender's actual signature that cannot be forged.

(True/False)
4.9/5
(45)

Discuss the key features of the one-time password technique:

(Essay)
4.9/5
(29)

What problem is common to all private key encryption techniques?

(Essay)
4.8/5
(28)

Which method is most likely to detect unauthorized access to the system?

(Multiple Choice)
4.8/5
(40)

What is a user-defined procedure?

(Essay)
4.9/5
(38)

Audit trails cannot be used to

(Multiple Choice)
4.9/5
(33)

What is deep packet inspection?

(Essay)
4.8/5
(36)

A network topology is the physical arrangement of the components of the network.

(True/False)
4.8/5
(28)

A firewall is a hardware partition designed to protect networks from power surges.

(True/False)
4.7/5
(41)
Showing 61 - 80 of 143
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)