Exam 15: Auditing It Controls Part II: Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called

(Multiple Choice)
5.0/5
(38)

Audit objectives in the electronic data interchange (EDI)environment include all of the following except

(Multiple Choice)
4.7/5
(38)

Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.

(True/False)
4.8/5
(31)

Computer viruses usually spread throughout the system before being detected.

(True/False)
4.8/5
(39)

List three methods of controlling unauthorized access to telecommunication messages.

(Essay)
4.9/5
(46)

What are biometric devices?

(Essay)
4.8/5
(31)

A firewall is a hardware partition designed to protect networks from power surges.

(True/False)
4.8/5
(32)

Explain how SYN flood attacks can be controlled.

(Essay)
4.9/5
(38)

An integrated group of programs that supports the applications and facilitates their access to specified resources is called a(n)

(Multiple Choice)
4.8/5
(38)

A formal log-on procedure is the operating system's first line of defense.Explain how this works.

(Essay)
4.8/5
(40)

Malicious and destructive programs cause millions of dollars of loss to corporations annually.

(True/False)
4.8/5
(40)

The request-response technique should detect if a data communication transmission has been diverted.

(True/False)
4.9/5
(30)

A software program that allows access to a system without going through the normal log-on procedures is called a

(Multiple Choice)
4.8/5
(35)

Audit objectives for the database management system include all of the following except

(Multiple Choice)
4.8/5
(36)

Discuss three sources of exposure (threats)to the operating system.

(Essay)
4.9/5
(40)

Which control will not reduce the likelihood of data loss due to a line error?

(Multiple Choice)
4.8/5
(38)

Which of the following is not an access control in a database system?

(Multiple Choice)
4.9/5
(31)

In an electronic data interchange (EDI)environment,when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table,the auditor is testing which audit objective?

(Multiple Choice)
4.8/5
(41)

Transaction logs are permanent records of transactions created to preserve audit trails in a computerized environment.

(True/False)
4.8/5
(36)

Describe two ways that passwords are used to authorize and validate messages in the electronic data interchange environment.

(Essay)
5.0/5
(38)
Showing 21 - 40 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)