Exam 15: Auditing It Controls Part II: Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In a telecommunications environment,line errors can be detected by using an echo check.

(True/False)
4.8/5
(36)

Explain how the one-time password approach works.

(Essay)
4.8/5
(41)

A formal log-on procedure is the operating system's last line of defense against unauthorized access.

(True/False)
4.7/5
(34)

All of the following are designed to control exposures from subversive threats except

(Multiple Choice)
4.9/5
(37)

A worm is software program that replicates itself in areas of idle memory until the system fails.

(True/False)
4.8/5
(40)

Describe three ways in which IPS can be used to protect against DDoS attacks?

(Essay)
4.8/5
(36)

Subschemas are used to authorize user access privileges to specific data elements.

(True/False)
4.9/5
(38)

Disguising message packets to look as if they came from another user in order to gain access to the host's network is called spooling.

(True/False)
4.8/5
(29)

Discuss the key features of the one-time password technique:

(Essay)
4.9/5
(37)

Which of the following is true?

(Multiple Choice)
4.8/5
(36)

What problem is common to all private key encryption techniques?

(Essay)
4.9/5
(39)

Viruses rarely attach themselves to executable files.

(True/False)
4.9/5
(40)

In determining whether a system is adequately protected from attacks by computer viruses,all of the following policies are relevant except

(Multiple Choice)
4.8/5
(34)

Which of the following is not a test of access controls?

(Multiple Choice)
4.9/5
(31)

Many techniques exist to reduce the likelihood and effects of data communication hardware failure.One of these is

(Multiple Choice)
4.9/5
(36)

In an electronic data interchange environment,customers routinely

(Multiple Choice)
4.9/5
(39)

What is EDI? How does its use affect the audit trail?

(Essay)
4.7/5
(38)

What is a virus?

(Essay)
4.9/5
(31)

All of the following techniques are used to validate electronic data interchange transactions except

(Multiple Choice)
5.0/5
(43)

Which of the following is not a basic database backup and recovery feature?

(Multiple Choice)
4.8/5
(43)
Showing 41 - 60 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)