Exam 16: IT Controls Part II: Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe two tests of controls that would provide evidence that the database management system is protected against unauthorized access attempts.

(Essay)
4.8/5
(38)

Viruses rarely attach themselves to executable files.

(True/False)
4.7/5
(34)

What is event monitoring?

(Essay)
4.9/5
(30)

A worm is software program that replicates itself in areas of idle memory until the system fails.

(True/False)
4.8/5
(36)

Operating system controls are of interest to system professionals but should not concern accountants and auditors.

(True/False)
4.7/5
(33)

In determining whether a system is adequately protected from attacks by computer viruses, all of the following policies are relevant except

(Multiple Choice)
4.8/5
(33)

In a computerized environment, the audit trail log must be printed onto paper documents.

(True/False)
4.8/5
(40)

A formal log-on procedure is the operating system's first line of defense. Explain how this works.

(Essay)
4.8/5
(42)

Contrast the Private Encryption Standard approach with the Public Key Encryption approach to controlling access to telecommunication messages.

(Essay)
4.9/5
(43)

Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.

(True/False)
5.0/5
(33)

All of the following will reduce the exposure to computer viruses except

(Multiple Choice)
4.9/5
(34)

The request-response technique should detect if a data communication transmission has been diverted.

(True/False)
4.8/5
(36)

Passwords are secret codes that users enter to gain access to systems. Security can be compromised by all of the following except

(Multiple Choice)
4.9/5
(35)

The checkpoint feature

(Multiple Choice)
4.7/5
(40)

In an electronic data interchange (EDI) environment, when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table, the auditor is testing which audit objective?

(Multiple Choice)
4.9/5
(47)

What are some typical problems with passwords?

(Essay)
4.8/5
(36)

Electronic data interchange customers may be given access to the vendor's data files.

(True/False)
4.7/5
(40)

What can be done to defeat a DDoS Attack?

(Essay)
4.8/5
(37)

Discuss three techniques for breaching operating system controls.

(Essay)
4.9/5
(34)

List three methods of controlling unauthorized access to telecommunication messages.

(Essay)
4.8/5
(31)
Showing 61 - 80 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)