Exam 15: Auditing It Controls Part II: Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Discuss three techniques for breaching operating system controls.

(Essay)
4.8/5
(33)

Which is not a biometric device?

(Multiple Choice)
4.8/5
(38)

Which of the following is considered an unintentional threat to the integrity of the operating system?

(Multiple Choice)
4.8/5
(35)

A recovery module suspends all data processing while the system reconciles its journal files against the database.

(True/False)
4.9/5
(38)

Transmitting numerous SYN packets to a targeted receiver,but not responding to an ACK,is

(Multiple Choice)
4.8/5
(43)

The checkpoint feature

(Multiple Choice)
4.8/5
(41)

What are the three security objectives of audit trails? Explain.

(Essay)
4.9/5
(44)

A value-added network can detect and reject transactions by unauthorized trading partners.

(True/False)
4.9/5
(34)

Electronic data interchange customers may be given access to the vendor's data files.

(True/False)
4.8/5
(40)

Describe two tests of controls that would provide evidence that the database management system is protected against unauthorized access attempts.

(Essay)
4.9/5
(39)

All of the following will reduce the exposure to computer viruses except

(Multiple Choice)
4.9/5
(44)

A Trojan horse

(Multiple Choice)
5.0/5
(35)

Electronic data interchange translation software interfaces with the sending firm and the value added network.

(True/False)
4.9/5
(39)

What is an operating system? What does it do? What are operating system control objectives?

(Essay)
4.9/5
(43)

All of the following tests of controls will provide evidence that access to the data files is limited except

(Multiple Choice)
4.9/5
(38)

What is a database authorization table?

(Essay)
4.8/5
(40)

Explain how transactions are audited in an electronic data interchange environment.

(Essay)
4.9/5
(46)

In an electronic data interchange environment,customers routinely access

(Multiple Choice)
4.8/5
(37)

One purpose of a database system is the easy sharing of data.But this ease of sharing can also jeopardize security.Discuss at least three forms of access control designed to reduce this risk.

(Essay)
4.8/5
(37)

Access controls protect databases against destruction,loss or misuse through unauthorized access.

(True/False)
4.9/5
(29)
Showing 61 - 80 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)