Exam 3: Security Part I: Auditing Operating Systems and Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The operating system performs all of the following tasks except

(Multiple Choice)
4.8/5
(37)

Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating subschemas.

(True/False)
4.8/5
(40)

In a hierarchical topology,network nodes communicate with each other via a central host computer.

(True/False)
4.9/5
(34)

Explain how SYN Flood attacks can be controlled.

(Essay)
4.8/5
(34)

A software program that replicates itself in areas of idle memory until the system fails is called a

(Multiple Choice)
5.0/5
(44)

A formal log-on procedure is the operating system's last line of defense against unauthorized access.

(True/False)
4.9/5
(39)

Define and contrast digital certificate and digital signature.

(Essay)
4.9/5
(41)

What security questions must be considered with regard to Internet commerce?

(Essay)
4.8/5
(47)

A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.

(True/False)
5.0/5
(40)

Operating system integrity is not of concern to accountants because only hardware risks are involved.

(True/False)
4.7/5
(41)

What is EDI? How does its use affect the audit trail?

(Essay)
4.8/5
(47)

Many techniques exist to reduce the likelihood and effects of data communication hardware failure.One of these is

(Multiple Choice)
4.9/5
(38)

Describe the basic differences between the star,ring,and bus topologies.

(Essay)
4.9/5
(32)

An integrated group of programs that supports the applications and facilitates their access to specified resources is called a (an)

(Multiple Choice)
4.9/5
(41)

A value added network can detect and reject transactions by unauthorized trading partners.

(True/False)
4.8/5
(34)

What is a virus?

(Essay)
4.9/5
(35)

Passwords are secret codes that users enter to gain access to systems.Security can be compromised by all of the following except

(Multiple Choice)
4.9/5
(39)

Viruses rarely attach themselves to executable files.

(True/False)
4.8/5
(35)

A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.

(True/False)
4.8/5
(32)

All of the following are objectives of operating system control except

(Multiple Choice)
4.9/5
(37)
Showing 81 - 100 of 143
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)