Exam 16: IT Controls Part II: Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Audit objectives for communications controls include all of the following except

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

D

A software program that replicates itself in areas of idle memory until the system fails is called a

Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
Verified

B

What are the three security objectives of audit trails? Explain.

Free
(Essay)
4.8/5
(37)
Correct Answer:
Verified

Audit trails support system security objectives in three ways. By detecting unauthorized access to the system, the audit trail protects the system from outsiders trying to breach system controls. By monitoring system performance, changes in the system may be detected. The audit trail can also contribute to reconstructing events such as system failures, security breaches, and processing errors. In addition, the ability to monitor user activity can support increased personal accountability.

Explain how smurf attacks can be controlled.

(Essay)
4.8/5
(39)

Which of the following is not an access control in a database system?

(Multiple Choice)
4.8/5
(40)

All of the following tests of controls will provide evidence that access to the data files is limited except

(Multiple Choice)
4.8/5
(36)

What are biometric devices?

(Essay)
4.8/5
(31)

Which method is most likely to detect unauthorized access to the system?

(Multiple Choice)
4.9/5
(31)

Explain how SYN Flood attacks can be controlled.

(Essay)
4.8/5
(42)

Which of the following deal with transaction legitimacy?

(Multiple Choice)
4.8/5
(33)

A firewall is a hardware partition designed to protect networks from power surges.

(True/False)
4.7/5
(40)

All of the following techniques are used to validate electronic data interchange transactions except

(Multiple Choice)
4.8/5
(31)

Which of the following is not a test of access controls?

(Multiple Choice)
5.0/5
(38)

Describe one benefit of using a call-back device.

(Essay)
4.9/5
(41)

Describe three ways in which IPS can be used to protect against DDoS Attacks?

(Essay)
4.8/5
(40)

Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called

(Multiple Choice)
4.7/5
(33)

Firewalls are

(Multiple Choice)
4.8/5
(41)

Which of the following is not a basic database backup and recovery feature?

(Multiple Choice)
4.9/5
(41)

A formal log-on procedure is the operating system's last line of defense against unauthorized access.

(True/False)
4.9/5
(43)

Describe two ways that passwords are used to authorize and validate messages in the electronic data interchange environment.

(Essay)
4.8/5
(38)
Showing 1 - 20 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)