Filters
Question type

Study Flashcards

Explain how SYN flood attacks can be controlled.

Correct Answer

verifed

verified

Two things can be done:
First,Internet h...

View Answer

A formal log-on procedure is the operating system's first line of defense.Explain how this works.

Correct Answer

verifed

verified

When the user logs on,he or she is prese...

View Answer

Describe two ways that passwords are used to authorize and validate messages in the electronic data interchange environment.

Correct Answer

verifed

verified

Value-added networks use passwords to de...

View Answer

What are biometric devices?

Correct Answer

verifed

verified

Biometric devices measure various person...

View Answer

List three methods of controlling unauthorized access to telecommunication messages.

Correct Answer

verifed

verified

call-back devices,data encrypt...

View Answer

Audit objectives for the database management system include all of the following except


A) verifying that the security group monitors and reports on fault tolerance violations
B) confirming that backup procedures are adequate
C) ensuring that authorized users access only those files they need to perform their duties
D) verifying that unauthorized users cannot access data files

Correct Answer

verifed

verified

Which of the following is not an access control in a database system?


A) antivirus software
B) database authorization table
C) passwords
D) voice prints

Correct Answer

verifed

verified

The request-response technique should detect if a data communication transmission has been diverted.

Correct Answer

verifed

verified

Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called


A) spoofing
B) spooling
C) dual-homing
D) screening

Correct Answer

verifed

verified

An integrated group of programs that supports the applications and facilitates their access to specified resources is called a(n)


A) operating system
B) database management system
C) utility system
D) facility system

Correct Answer

verifed

verified

Audit objectives in the electronic data interchange (EDI) environment include all of the following except


A) all EDI transactions are authorized
B) unauthorized trading partners cannot gain access to database records
C) a complete audit trail of EDI transactions is maintained
D) backup procedures are in place and functioning properly

Correct Answer

verifed

verified

Computer viruses usually spread throughout the system before being detected.

Correct Answer

verifed

verified

Which control will not reduce the likelihood of data loss due to a line error?


A) echo check
B) encryption
C) vertical parity bit
D) horizontal parity bit

Correct Answer

verifed

verified

Transaction logs are permanent records of transactions created to preserve audit trails in a computerized environment.

Correct Answer

verifed

verified

Discuss three sources of exposure (threats)to the operating system.

Correct Answer

verifed

verified

1.Privileged personnel who abuse their a...

View Answer

A software program that allows access to a system without going through the normal log-on procedures is called a


A) logic bomb
B) Trojan horse
C) worm
D) back door

Correct Answer

verifed

verified

A firewall is a hardware partition designed to protect networks from power surges.

Correct Answer

verifed

verified

Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.

Correct Answer

verifed

verified

In an electronic data interchange (EDI) environment,when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table,the auditor is testing which audit objective?


A) all EDI transactions are authorized
B) unauthorized trading partners cannot gain access to database records
C) authorized trading partners have access only to approved data
D) a complete audit trail is maintained

Correct Answer

verifed

verified

Malicious and destructive programs cause millions of dollars of loss to corporations annually.

Correct Answer

verifed

verified

Showing 21 - 40 of 95

Related Exams

Show Answer