Deck 3: Security Part I: Auditing Operating Systems and Networks

Full screen (f)
exit full mode
Question
To preserve audit trails in a computerized environment,transaction logs are permanent records of transactions.
Use Space or
up arrow
down arrow
to flip the card.
Question
Viruses rarely attach themselves to executable files.
Question
Electronic data interchange customers may be given access to the vendor's data files.
Question
A worm is software program that replicates itself in areas of idle memory until the system fails.
Question
The message authentication code is calculated by the sender and the receiver of a data transmission.
Question
The most frequent victims of program viruses are microcomputers.
Question
Firewalls are special materials used to insulate computer facilities
Question
Operating system controls are of interest to system professionals but should not concern accountants and auditors.
Question
Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.
Question
Computer viruses usually spread throughout the system before being detected.
Question
Electronic data interchange translation software interfaces with the sending firm and the value added network.
Question
A firewall is a hardware partition designed to protect networks from power surges.
Question
A value added network can detect and reject transactions by unauthorized trading partners.
Question
A formal log-on procedure is the operating system's last line of defense against unauthorized access.
Question
The request-response technique should detect if a data communication transmission has been diverted.
Question
Disguising message packets to look as if they came from another user and to gain access to the host's network is called spooling.
Question
The audit trail for electronic data interchange transactions is stored on magnetic media.
Question
Operating system integrity is not of concern to accountants because only hardware risks are involved.
Question
In a computerized environment,the audit trail log must be printed onto paper documents.
Question
In a telecommunications environment,line errors can be detected by using an echo check.
Question
A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.
Question
In a hierarchical topology,network nodes communicate with each other via a central host computer.
Question
The intermediary in a smurf attack is also a victim.
Question
A distributed denial of service (DDoS)attack may take the form of a SYN flood but not a smurf attack.
Question
Only two types of motivation drive DoS attacks: 1)to punish an organization with which the perpetrator had a grievance; and 2)to gain bragging rights for being able to do it.
Question
A digital signature is a digital copy of the sender's actual signature that cannot be forged.
Question
The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.
Question
A network topology is the physical arrangement of the components of the network.
Question
The rules that make it possible for users of networks to communicate are called protocols.
Question
Cookies are files created by user computers and stored on Web servers.
Question
Because of network protocols,users of networks built by different manufacturers are able to communicate and share data.
Question
IP spoofing is a form of masquerading to gain unauthorized access to a Web server.
Question
The more individuals that need to exchange encrypted data,the greater the chance that the key will become known to an intruder. To overcome this problem,private key encryption was devised.
Question
The standard format for an e-mail address is DOMAIN NAME@USER NAME.
Question
Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating subschemas.
Question
The bus topology connects the nodes in parallel.
Question
A bus topology is less costly to install than a ring topology.
Question
Polling is one technique used to control data collisions.
Question
A smurf attack involves three participants: a zombie,an intermediary,and the victim.
Question
The client-server model can only be applied to ring and star topologies.
Question
Which method will render useless data captured by unauthorized receivers?

A) echo check
B) parity bit
C) public key encryption
D) message sequencing
Question
All of the following techniques are used to validate electronic data interchange transactions except

A) value added networks can compare passwords to a valid customer file before message transmission
B) prior to converting the message, the translation software of the receiving company can compare the password against a validation file in the firm's database
C) the recipient's application software can validate the password prior to processing
D) the recipient's application software can validate the password after the transaction has been processed
Question
A ping is an Internet maintenance tool that is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Question
Passwords are secret codes that users enter to gain access to systems.Security can be compromised by all of the following except

A) failure to change passwords on a regular basis
B) using obscure passwords unknown to others
C) recording passwords in obvious places
D) selecting passwords that can be easily detected by computer criminals
Question
In an electronic data interchange environment,customers routinely access

A) the vendor's price list file
B) the vendor's accounts payable file
C) the vendor's open purchase order file
D) none of the above
Question
A software program that replicates itself in areas of idle memory until the system fails is called a

A) Trojan horse
B) worm
C) logic bomb
D) none of the above
Question
Audit trails cannot be used to

A) detect unauthorized access to systems
B) facilitate reconstruction of events
C) reduce the need for other forms of security
D) promote personal accountability
Question
A software program that allows access to a system without going through the normal logon procedures is called a

A) logic bomb
B) Trojan horse
C) worm
D) back door
Question
A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Question
The operating system performs all of the following tasks except

A) translates third-generation languages into machine language
B) assigns memory to applications
C) authorizes user access
D) schedules job processing
Question
Which of the following is considered an unintentional threat to the integrity of the operating system?

A) a hacker gaining access to the system because of a security flaw
B) a hardware flaw that causes the system to crash
C) a virus that formats the hard drive
D) the systems programmer accessing individual user files
Question
Which is not a biometric device?

A) password
B) retina prints
C) voice prints
D) signature characteristics
Question
Which control will not reduce the likelihood of data loss due to a line error?

A) echo check
B) encryption
C) vertical parity bit
D) horizontal parity bit
Question
Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called

A) spoofing.
B) spooling.
C) dual-homed.
D) screening.
Question
Which method is most likely to detect unauthorized access to the system?

A) message transaction log
B) data encryption standard
C) vertical parity check
D) request-response technique
Question
HTML tags are customized to delimit attributes,the content of which can be read and processed by computer applications.
Question
All of the following are objectives of operating system control except

A) protecting the OS from users
B) protesting users from each other
C) protecting users from themselves
D) protecting the environment from users
Question
All of the following will reduce the exposure to computer viruses except

A) install antivirus software
B) install factory-sealed application software
C) assign and control user passwords
D) install public-domain software from reputable bulletin boards
Question
Audit objectives for communications controls include all of the following except

A) detection and correction of message loss due to equipment failure
B) prevention and detection of illegal access to communication channels
C) procedures that render intercepted messages useless
D) all of the above
Question
All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except

A) verifying that only authorized software is used on company computers
B) reviewing system maintenance records
C) confirming that antivirus software is in use
D) examining the password policy including a review of the authority table
Question
An integrated group of programs that supports the applications and facilitates their access to specified resources is called a (an)

A) operating system.
B) database management system.
C) utility system
D) facility system.
E) object system.
Question
Which of the following deal with transaction legitimacy?

A) transaction authorization and validation
B) access controls
C) EDI audit trail
D) all of the above
Question
Network protocols fulfill all of the following objectives except

A) facilitate physical connection between network devices
B) provide a basis for error checking and measuring network performance
C) promote compatibility among network devices
D) result in inflexible standards
Question
Transmitting numerous SYN packets to a targeted receiver,but NOT responding to an ACK,is

A) a smurf attack.
B) IP Spoofing.
C) an ACK echo attack
D) a ping attack.
E) none of the above
Question
When auditors examine and test the call-back feature,they are testing which audit objective?

A) incompatible functions have been segregated
B) application programs are protected from unauthorized access
C) physical security measures are adequate to protect the organization from natural disaster
D) illegal access to the system is prevented and detected
Question
In determining whether a system is adequately protected from attacks by computer viruses,all of the following policies are relevant except

A) the policy on the purchase of software only from reputable vendors
B) the policy that all software upgrades are checked for viruses before they are implemented
C) the policy that current versions of antivirus software should be available to all users
D) the policy that permits users to take files home to work on them
Question
Which of the following is true?

A) Deep Packet Inspection uses a variety of analytical and statistical techniques to evaluate the contents of message packets.
B) An Intrusion prevention system works in parallel with a firewall at the perimeter of the network to act as a filer that removes malicious packets from the flow before they can affect servers and networks.
C) A distributed denial of service attack is so named because it is capable of attacking many victims simultaneously who are distributed across the internet.
D) None of the above are true statements.
Question
To physically connect a workstation to a LAN requires a

A) file server
B) network interface card
C) multiplexer
D) bridge
Question
Which of the following is not a test of access controls?

A) biometric controls
B) encryption controls
C) backup controls
D) inference controls
Question
In an electronic data interchange environment,customers routinely

A) access the vendor's accounts receivable file with read/write authority
B) access the vendor's price list file with read/write authority
C) access the vendor's inventory file with read-only authority
D) access the vendor's open purchase order file with read-only authority
Question
Packet switching

A) combines the messages of multiple users into one packet for transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users.
B) is a method for partitioning a database into packets for easy access where no identifiable primary user exists in the organization.
C) is used to establish temporary connections between network devices for the duration of a communication session.
D) is a denial of service technique that disassembles various incoming messages to targeted users into small packages and then reassembles them in random order to create a useless garbled message.
Question
All of the following are designed to control exposures from subversive threats except

A) firewalls
B) one-time passwords
C) field interrogation
D) data encryption
Question
Many techniques exist to reduce the likelihood and effects of data communication hardware failure.One of these is

A) hardware access procedures
B) antivirus software
C) parity checks
D) data encryption
Question
Firewalls are

A) special materials used to insulate computer facilities
B) a system that enforces access control between two networks
C) special software used to screen Internet access
D) none of the above
Question
What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?

A) LAN
B) decentralized network
C) multidrop network
D) Intranet
Question
In an electronic data interchange (EDI)environment,when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table,the auditor is testing which audit objective?

A) all EDI transactions are authorized
B) unauthorized trading partners cannot gain access to database records
C) authorized trading partners have access only to approved data
D) a complete audit trail is maintained
Question
Audit objectives in the electronic data interchange (EDI)environment include all of the following except

A) all EDI transactions are authorized
B) unauthorized trading partners cannot gain access to database records
C) a complete audit trail of EDI transactions is maintained
D) backup procedures are in place and functioning properly
Question
One advantage of network technology is

A) bridges and gateways connect one workstation with another workstation
B) the network interface card permits different networks to share data
C) file servers permit software and data to be shared with other network users
D) a universal topology facilitates the transfer of data among networks
Question
Advance encryption standard (AES)is

A) a 64 -bit private key encryption technique
B) a 128-bit private key encryption technique
C) a 128-bit public key encryption technique
D) a 256-bit public encryption technique that has become a U.S. government standard
Question
In an electronic data interchange environment,the audit trail

A) is a printout of all incoming and outgoing transactions
B) is an electronic log of all transactions received, translated, and processed by the system
C) is a computer resource authority table
D) consists of pointers and indexes within the database
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/143
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Security Part I: Auditing Operating Systems and Networks
1
To preserve audit trails in a computerized environment,transaction logs are permanent records of transactions.
True
2
Viruses rarely attach themselves to executable files.
False
3
Electronic data interchange customers may be given access to the vendor's data files.
True
4
A worm is software program that replicates itself in areas of idle memory until the system fails.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
5
The message authentication code is calculated by the sender and the receiver of a data transmission.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
6
The most frequent victims of program viruses are microcomputers.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
7
Firewalls are special materials used to insulate computer facilities
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
8
Operating system controls are of interest to system professionals but should not concern accountants and auditors.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
9
Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
10
Computer viruses usually spread throughout the system before being detected.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
11
Electronic data interchange translation software interfaces with the sending firm and the value added network.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
12
A firewall is a hardware partition designed to protect networks from power surges.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
13
A value added network can detect and reject transactions by unauthorized trading partners.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
14
A formal log-on procedure is the operating system's last line of defense against unauthorized access.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
15
The request-response technique should detect if a data communication transmission has been diverted.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
16
Disguising message packets to look as if they came from another user and to gain access to the host's network is called spooling.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
17
The audit trail for electronic data interchange transactions is stored on magnetic media.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
18
Operating system integrity is not of concern to accountants because only hardware risks are involved.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
19
In a computerized environment,the audit trail log must be printed onto paper documents.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
20
In a telecommunications environment,line errors can be detected by using an echo check.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
21
A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
22
In a hierarchical topology,network nodes communicate with each other via a central host computer.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
23
The intermediary in a smurf attack is also a victim.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
24
A distributed denial of service (DDoS)attack may take the form of a SYN flood but not a smurf attack.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
25
Only two types of motivation drive DoS attacks: 1)to punish an organization with which the perpetrator had a grievance; and 2)to gain bragging rights for being able to do it.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
26
A digital signature is a digital copy of the sender's actual signature that cannot be forged.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
27
The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
28
A network topology is the physical arrangement of the components of the network.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
29
The rules that make it possible for users of networks to communicate are called protocols.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
30
Cookies are files created by user computers and stored on Web servers.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
31
Because of network protocols,users of networks built by different manufacturers are able to communicate and share data.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
32
IP spoofing is a form of masquerading to gain unauthorized access to a Web server.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
33
The more individuals that need to exchange encrypted data,the greater the chance that the key will become known to an intruder. To overcome this problem,private key encryption was devised.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
34
The standard format for an e-mail address is DOMAIN NAME@USER NAME.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
35
Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating subschemas.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
36
The bus topology connects the nodes in parallel.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
37
A bus topology is less costly to install than a ring topology.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
38
Polling is one technique used to control data collisions.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
39
A smurf attack involves three participants: a zombie,an intermediary,and the victim.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
40
The client-server model can only be applied to ring and star topologies.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
41
Which method will render useless data captured by unauthorized receivers?

A) echo check
B) parity bit
C) public key encryption
D) message sequencing
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
42
All of the following techniques are used to validate electronic data interchange transactions except

A) value added networks can compare passwords to a valid customer file before message transmission
B) prior to converting the message, the translation software of the receiving company can compare the password against a validation file in the firm's database
C) the recipient's application software can validate the password prior to processing
D) the recipient's application software can validate the password after the transaction has been processed
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
43
A ping is an Internet maintenance tool that is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
44
Passwords are secret codes that users enter to gain access to systems.Security can be compromised by all of the following except

A) failure to change passwords on a regular basis
B) using obscure passwords unknown to others
C) recording passwords in obvious places
D) selecting passwords that can be easily detected by computer criminals
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
45
In an electronic data interchange environment,customers routinely access

A) the vendor's price list file
B) the vendor's accounts payable file
C) the vendor's open purchase order file
D) none of the above
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
46
A software program that replicates itself in areas of idle memory until the system fails is called a

A) Trojan horse
B) worm
C) logic bomb
D) none of the above
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
47
Audit trails cannot be used to

A) detect unauthorized access to systems
B) facilitate reconstruction of events
C) reduce the need for other forms of security
D) promote personal accountability
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
48
A software program that allows access to a system without going through the normal logon procedures is called a

A) logic bomb
B) Trojan horse
C) worm
D) back door
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
49
A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
50
The operating system performs all of the following tasks except

A) translates third-generation languages into machine language
B) assigns memory to applications
C) authorizes user access
D) schedules job processing
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is considered an unintentional threat to the integrity of the operating system?

A) a hacker gaining access to the system because of a security flaw
B) a hardware flaw that causes the system to crash
C) a virus that formats the hard drive
D) the systems programmer accessing individual user files
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
52
Which is not a biometric device?

A) password
B) retina prints
C) voice prints
D) signature characteristics
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
53
Which control will not reduce the likelihood of data loss due to a line error?

A) echo check
B) encryption
C) vertical parity bit
D) horizontal parity bit
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
54
Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called

A) spoofing.
B) spooling.
C) dual-homed.
D) screening.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
55
Which method is most likely to detect unauthorized access to the system?

A) message transaction log
B) data encryption standard
C) vertical parity check
D) request-response technique
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
56
HTML tags are customized to delimit attributes,the content of which can be read and processed by computer applications.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
57
All of the following are objectives of operating system control except

A) protecting the OS from users
B) protesting users from each other
C) protecting users from themselves
D) protecting the environment from users
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
58
All of the following will reduce the exposure to computer viruses except

A) install antivirus software
B) install factory-sealed application software
C) assign and control user passwords
D) install public-domain software from reputable bulletin boards
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
59
Audit objectives for communications controls include all of the following except

A) detection and correction of message loss due to equipment failure
B) prevention and detection of illegal access to communication channels
C) procedures that render intercepted messages useless
D) all of the above
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
60
All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except

A) verifying that only authorized software is used on company computers
B) reviewing system maintenance records
C) confirming that antivirus software is in use
D) examining the password policy including a review of the authority table
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
61
An integrated group of programs that supports the applications and facilitates their access to specified resources is called a (an)

A) operating system.
B) database management system.
C) utility system
D) facility system.
E) object system.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following deal with transaction legitimacy?

A) transaction authorization and validation
B) access controls
C) EDI audit trail
D) all of the above
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
63
Network protocols fulfill all of the following objectives except

A) facilitate physical connection between network devices
B) provide a basis for error checking and measuring network performance
C) promote compatibility among network devices
D) result in inflexible standards
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
64
Transmitting numerous SYN packets to a targeted receiver,but NOT responding to an ACK,is

A) a smurf attack.
B) IP Spoofing.
C) an ACK echo attack
D) a ping attack.
E) none of the above
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
65
When auditors examine and test the call-back feature,they are testing which audit objective?

A) incompatible functions have been segregated
B) application programs are protected from unauthorized access
C) physical security measures are adequate to protect the organization from natural disaster
D) illegal access to the system is prevented and detected
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
66
In determining whether a system is adequately protected from attacks by computer viruses,all of the following policies are relevant except

A) the policy on the purchase of software only from reputable vendors
B) the policy that all software upgrades are checked for viruses before they are implemented
C) the policy that current versions of antivirus software should be available to all users
D) the policy that permits users to take files home to work on them
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following is true?

A) Deep Packet Inspection uses a variety of analytical and statistical techniques to evaluate the contents of message packets.
B) An Intrusion prevention system works in parallel with a firewall at the perimeter of the network to act as a filer that removes malicious packets from the flow before they can affect servers and networks.
C) A distributed denial of service attack is so named because it is capable of attacking many victims simultaneously who are distributed across the internet.
D) None of the above are true statements.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
68
To physically connect a workstation to a LAN requires a

A) file server
B) network interface card
C) multiplexer
D) bridge
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following is not a test of access controls?

A) biometric controls
B) encryption controls
C) backup controls
D) inference controls
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
70
In an electronic data interchange environment,customers routinely

A) access the vendor's accounts receivable file with read/write authority
B) access the vendor's price list file with read/write authority
C) access the vendor's inventory file with read-only authority
D) access the vendor's open purchase order file with read-only authority
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
71
Packet switching

A) combines the messages of multiple users into one packet for transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users.
B) is a method for partitioning a database into packets for easy access where no identifiable primary user exists in the organization.
C) is used to establish temporary connections between network devices for the duration of a communication session.
D) is a denial of service technique that disassembles various incoming messages to targeted users into small packages and then reassembles them in random order to create a useless garbled message.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
72
All of the following are designed to control exposures from subversive threats except

A) firewalls
B) one-time passwords
C) field interrogation
D) data encryption
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
73
Many techniques exist to reduce the likelihood and effects of data communication hardware failure.One of these is

A) hardware access procedures
B) antivirus software
C) parity checks
D) data encryption
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
74
Firewalls are

A) special materials used to insulate computer facilities
B) a system that enforces access control between two networks
C) special software used to screen Internet access
D) none of the above
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
75
What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?

A) LAN
B) decentralized network
C) multidrop network
D) Intranet
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
76
In an electronic data interchange (EDI)environment,when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table,the auditor is testing which audit objective?

A) all EDI transactions are authorized
B) unauthorized trading partners cannot gain access to database records
C) authorized trading partners have access only to approved data
D) a complete audit trail is maintained
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
77
Audit objectives in the electronic data interchange (EDI)environment include all of the following except

A) all EDI transactions are authorized
B) unauthorized trading partners cannot gain access to database records
C) a complete audit trail of EDI transactions is maintained
D) backup procedures are in place and functioning properly
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
78
One advantage of network technology is

A) bridges and gateways connect one workstation with another workstation
B) the network interface card permits different networks to share data
C) file servers permit software and data to be shared with other network users
D) a universal topology facilitates the transfer of data among networks
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
79
Advance encryption standard (AES)is

A) a 64 -bit private key encryption technique
B) a 128-bit private key encryption technique
C) a 128-bit public key encryption technique
D) a 256-bit public encryption technique that has become a U.S. government standard
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
80
In an electronic data interchange environment,the audit trail

A) is a printout of all incoming and outgoing transactions
B) is an electronic log of all transactions received, translated, and processed by the system
C) is a computer resource authority table
D) consists of pointers and indexes within the database
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 143 flashcards in this deck.