Exam 16: IT Controls Part II: Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A firewall is a hardware partition designed to protect networks from power surges.

Free
(True/False)
4.9/5
(31)
Correct Answer:
Verified

False

Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called

Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
Verified

A

What is EDI? How does its use affect the audit trail?

Free
(Essay)
4.8/5
(38)
Correct Answer:
Verified

Electronic data interchange is an arrangement which links the computer systems of two trading partners to expedite sales/purchases.The buying company's purchasing system creates and transmits a purchase order electronically in an agreed format,either directly or through a value-added network.The selling company receives the information,and it is converted electronically into a sales order. The absence of paper documents in an EDI transaction disrupts the traditional audit trail.This can be compensated for through the use of transaction logs which can be reconciled.

List three methods of controlling unauthorized access to telecommunication messages.

(Essay)
4.9/5
(47)

Describe three ways in which IPS can be used to protect against DDoS Attacks?

(Essay)
5.0/5
(47)

Subschemas are used to authorize user access privileges to specific data elements.

(True/False)
4.7/5
(35)

What is a user-defined procedure?

(Essay)
4.7/5
(40)

All of the following are objectives of operating system control except

(Multiple Choice)
4.9/5
(38)

What are biometric devices?

(Essay)
4.8/5
(35)

Advance encryption standard (AES)is

(Multiple Choice)
4.9/5
(43)

All of the following will reduce the exposure to computer viruses except

(Multiple Choice)
4.8/5
(36)

Electronic data interchange customers may be given access to the vendor's data files.

(True/False)
4.8/5
(32)

Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.

(True/False)
4.8/5
(36)

Discuss the key features of the one-time password technique:

(Essay)
4.8/5
(38)

What is a database authorization table?

(Essay)
4.8/5
(38)

What problem is common to all private key encryption techniques?

(Essay)
4.7/5
(28)

A software program that allows access to a system without going through the normal logon procedures is called a

(Multiple Choice)
5.0/5
(28)

Which method is most likely to detect unauthorized access to the system?

(Multiple Choice)
4.9/5
(29)

Explain how the one-time password approach works.

(Essay)
4.8/5
(37)

Describe two ways that passwords are used to authorize and validate messages in the electronic data interchange environment.

(Essay)
4.8/5
(42)
Showing 1 - 20 of 94
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)