Exam 3: Security Part I: Auditing Operating Systems and Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the three security objectives of audit trails? Explain.

(Essay)
4.8/5
(38)

Firewalls are special materials used to insulate computer facilities

(True/False)
4.8/5
(38)

Cookies are files created by user computers and stored on Web servers.

(True/False)
4.7/5
(39)

Electronic data interchange customers may be given access to the vendor's data files.

(True/False)
4.9/5
(34)

Polling is one technique used to control data collisions.

(True/False)
4.9/5
(41)

What are network protocols? What functions do they perform?

(Essay)
4.9/5
(43)

In an electronic data interchange environment,customers routinely access

(Multiple Choice)
4.7/5
(53)

One advantage of network technology is

(Multiple Choice)
4.8/5
(35)

The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.

(True/False)
4.8/5
(39)

To physically connect a workstation to a LAN requires a

(Multiple Choice)
4.8/5
(40)

Because of network protocols,users of networks built by different manufacturers are able to communicate and share data.

(True/False)
4.9/5
(33)

What are some typical problems with passwords?

(Essay)
4.8/5
(45)

The more individuals that need to exchange encrypted data,the greater the chance that the key will become known to an intruder. To overcome this problem,private key encryption was devised.

(True/False)
4.9/5
(45)

A ping signal is used to initiate

(Multiple Choice)
4.7/5
(39)

Explain the function of the two parts of the TCP/IP protocol.

(Essay)
4.9/5
(34)

Firewalls are

(Multiple Choice)
4.9/5
(37)

Network communication poses some special types of risk for a business.What are the two broad areas of concern? Explain.

(Essay)
4.8/5
(41)

What is event monitoring?

(Essay)
4.9/5
(32)

Explain how transactions are audited in an electronic data interchange environment.

(Essay)
4.9/5
(37)

Computer viruses usually spread throughout the system before being detected.

(True/False)
4.8/5
(30)
Showing 121 - 140 of 143
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)