Exam 16: IT Controls Part II: Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is true?

(Multiple Choice)
4.8/5
(32)

Describe two tests of controls that would provide evidence that the database management system is protected against unauthorized access attempts.

(Essay)
4.9/5
(41)

To preserve audit trails in a computerized environment,transaction logs are permanent records of transactions.

(True/False)
4.8/5
(33)

In a computerized environment,the audit trail log must be printed onto paper documents.

(True/False)
4.9/5
(33)

What is event monitoring?

(Essay)
4.8/5
(35)

A software program that replicates itself in areas of idle memory until the system fails is called a

(Multiple Choice)
4.8/5
(39)

An integrated group of programs that supports the applications and facilitates their access to specified resources is called a (an)

(Multiple Choice)
4.7/5
(39)

What are the auditor's concerns in testing EDI controls?

(Essay)
4.9/5
(38)

One purpose of a database system is the easy sharing of data.But this ease of sharing can also jeopardize security.Discuss at least three forms of access control designed to reduce this risk.

(Essay)
4.9/5
(34)

A formal log-on procedure is the operating system's first line of defense.Explain how this works.

(Essay)
5.0/5
(44)

In a direct access file system

(Multiple Choice)
4.8/5
(26)

Audit objectives for communications controls include all of the following except

(Multiple Choice)
4.8/5
(34)

What can be done to defeat a DDoS Attack?

(Essay)
4.9/5
(45)

Firewalls are special materials used to insulate computer facilities

(True/False)
5.0/5
(41)

The most frequent victims of program viruses are microcomputers.

(True/False)
4.9/5
(38)

What are the three security objectives of audit trails? Explain.

(Essay)
4.9/5
(37)

In an electronic data interchange environment,customers routinely access

(Multiple Choice)
4.9/5
(40)

In an electronic data interchange environment,the audit trail

(Multiple Choice)
4.9/5
(33)

Computer viruses usually spread throughout the system before being detected.

(True/False)
4.9/5
(47)

Passwords are secret codes that users enter to gain access to systems.Security can be compromised by all of the following except

(Multiple Choice)
4.8/5
(29)
Showing 61 - 80 of 94
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)