Exam 16: IT Controls Part II: Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A formal log-on procedure is the operating system's last line of defense against unauthorized access.

(True/False)
4.8/5
(41)

What is deep packet inspection?

(Essay)
4.9/5
(39)

What is a virus?

(Essay)
4.8/5
(24)

All of the following techniques are used to validate electronic data interchange transactions except

(Multiple Choice)
4.9/5
(37)

The operating system performs all of the following tasks except

(Multiple Choice)
4.8/5
(34)

Which of the following is considered an unintentional threat to the integrity of the operating system?

(Multiple Choice)
4.8/5
(33)

Audit trails cannot be used to

(Multiple Choice)
4.8/5
(39)

Which control will not reduce the likelihood of data loss due to a line error?

(Multiple Choice)
4.8/5
(45)

Which method will render useless data captured by unauthorized receivers?

(Multiple Choice)
4.7/5
(37)

The audit trail for electronic data interchange transactions is stored on magnetic media.

(True/False)
4.8/5
(33)

When creating and controlling backups for a sequential batch system,

(Multiple Choice)
4.8/5
(48)

Describe one benefit of using a call-back device.

(Essay)
4.8/5
(39)

In a telecommunications environment,line errors can be detected by using an echo check.

(True/False)
4.7/5
(41)

Contrast the Private Encryption Standard approach with the Public Key Encryption approach to controlling access to telecommunication messages.

(Essay)
4.9/5
(34)

Which of the following is not an access control in a database system?

(Multiple Choice)
4.8/5
(42)

Discuss three techniques for breaching operating system controls.

(Essay)
4.8/5
(42)

Audit objectives for the database management system include all of the following except

(Multiple Choice)
4.8/5
(38)

In determining whether a system is adequately protected from attacks by computer viruses,all of the following policies are relevant except

(Multiple Choice)
4.8/5
(32)

Access controls protect databases against destruction,loss or misuse through unauthorized access.

(True/False)
4.8/5
(30)

A value added network can detect and reject transactions by unauthorized trading partners.

(True/False)
4.8/5
(32)
Showing 21 - 40 of 94
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)