Filters
Question type

Study Flashcards

Which of the following deal with transaction legitimacy?


A) transaction authorization and validation
B) access controls
C) EDI audit trail
D) all of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is not an access control in a database system?


A) antivirus software
B) database authorization table
C) passwords
D) voice prints

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What are the three security objectives of audit trails? Explain.

Correct Answer

verifed

verified

Audit trails support system security objectives in three ways. By detecting unauthorized access to the system, the audit trail protects the system from outsiders trying to breach system controls. By monitoring system performance, changes in the system may be detected. The audit trail can also contribute to reconstructing events such as system failures, security breaches, and processing errors. In addition, the ability to monitor user activity can support increased personal accountability.

Explain how SYN Flood attacks can be controlled.

Correct Answer

verifed

verified

Two things can be done:
First, Internet ...

View Answer

Firewalls are


A) special materials used to insulate computer facilities
B) a system that enforces access control between two networks
C) special software used to screen Internet access
D) none of the above

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Describe two ways that passwords are used to authorize and validate messages in the electronic data interchange environment.

Correct Answer

verifed

verified

value-added networks use passwords to de...

View Answer

All of the following techniques are used to validate electronic data interchange transactions except


A) value added networks can compare passwords to a valid customer file before message transmission
B) prior to converting the message, the translation software of the receiving company can compare the password against a validation file in the firm's database
C) the recipient's application software can validate the password prior to processing
D) the recipient's application software can validate the password after the transaction has been processed

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Which of the following is not a test of access controls?


A) biometric controls
B) encryption controls
C) backup controls
D) inference controls

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Describe one benefit of using a call-back device.

Correct Answer

verifed

verified

Access to the system is achieved when th...

View Answer

All of the following tests of controls will provide evidence that access to the data files is limited except


A) inspecting biometric controls
B) reconciling program version numbers
C) comparing job descriptions with access privileges stored in the authority table
D) attempting to retrieve unauthorized data via inference queries

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Describe three ways in which IPS can be used to protect against DDoS Attacks?

Correct Answer

verifed

verified

1) IPS cam work inline with a firewall a...

View Answer

Which method is most likely to detect unauthorized access to the system?


A) message transaction log
B) data encryption standard
C) vertical parity check
D) request-response technique

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

What are biometric devices?

Correct Answer

verifed

verified

Biometric devices measure various person...

View Answer

Which of the following is not a basic database backup and recovery feature?


A) checkpoint
B) backup database
C) transaction log
D) database authority table

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Explain how smurf attacks can be controlled.

Correct Answer

verifed

verified

The targeted organization can ...

View Answer

Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called


A) spoofing.
B) spooling.
C) dual-homed.
D) screening.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

A software program that replicates itself in areas of idle memory until the system fails is called a


A) Trojan horse
B) Worm
C) logic bomb
D) none of the above

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

B

A firewall is a hardware partition designed to protect networks from power surges.

A) True
B) False

Correct Answer

verifed

verified

Audit objectives for communications controls include all of the following except


A) detection and correction of message loss due to equipment failure
B) prevention and detection of illegal access to communication channels
C) procedures that render intercepted messages useless
D) all of the above

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

D

A formal log-on procedure is the operating system's last line of defense against unauthorized access.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 96

Related Exams

Show Answer