Exam 16: IT Controls Part II: Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating subschemas.

(True/False)
4.9/5
(39)

Electronic data interchange translation software interfaces with the sending firm and the value added network.

(True/False)
4.8/5
(28)

Operating system integrity is not of concern to accountants because only hardware risks are involved.

(True/False)
4.9/5
(33)

Explain how SYN Flood attacks can be controlled.

(Essay)
4.8/5
(37)

All of the following tests of controls will provide evidence that access to the data files is limited except

(Multiple Choice)
5.0/5
(40)

Explain how smurf attacks can be controlled.

(Essay)
4.9/5
(41)

Which backup technique is most appropriate for sequential batch systems?

(Multiple Choice)
4.9/5
(35)

All of the following are designed to control exposures from subversive threats except

(Multiple Choice)
4.8/5
(45)

Disguising message packets to look as if they came from another user and to gain access to the host's network is called spooling.

(True/False)
4.9/5
(40)

Which is not a biometric device?

(Multiple Choice)
4.9/5
(48)

Explain the concept of discretionary access privileges.

(Essay)
4.7/5
(43)

Briefly define an operating system.

(Essay)
4.8/5
(36)

Which of the following is not a test of access controls?

(Multiple Choice)
4.7/5
(48)

Transmitting numerous SYN packets to a targeted receiver,but NOT responding to an ACK,is

(Multiple Choice)
4.9/5
(46)
Showing 81 - 94 of 94
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)