The operating system performs all of the following tasks except
a. translates third-generation languages into machine language
b. assigns memory to applications
c. authorizes user access
d. schedules job processing
C
Which of the following is considered an unintentional threat to the integrity of the
operating system?
a. a hacker gaining access to the system because of a security flaw
b. a hardware flaw that causes the system to crash
c. a virus that formats the hard drive
d. the systems programmer accessing individual user files
B
A software program that replicates itself in areas of idle memory until the system fails is
called a
a. Trojan horse
b. worm
c. logic bomb
d. none of the above
B
A software program that allows access to a system without going through the normal
logon procedures is called a
a. logic bomb
b. Trojan horse
c. worm
d. back door
D
All of the following will reduce the exposure to computer viruses except
a. install antivirus software
b. install factory-sealed application software
c. assign and control user passwords
d. install public-domain software from reputable bulletin boards
D
Hackers can disguise their message packets to look as if they came from an authorized
user and gain access to the host’s network using a technique called
a. spoofing.
b. spooling.
c. dual-homed.
d. Screening.
A
Passwords are secret codes that users enter to gain access to systems. Security can be
compromised by all of the following except
a. failure to change passwords on a regular basis
b. using obscure passwords unknown to others
c. recording passwords in obvious places
d. selecting passwords that can be easily detected by computer criminals
B
Which control will not reduce the likelihood of data loss due to a line error?
a. echo check
b. Encryption
c. vertical parity bit
d. horizontal parity bit
B
Which method will render useless data captured by unauthorized receivers?
a. echo check
b. parity bit
c. public key encryption
d. message sequencing
C
Which method is most likely to detect unauthorized access to the system?
a. message transaction log
b. data encryption standard
c. vertical parity check
d. request-response technique
A
All of the following techniques are used to validate electronic data interchange
transactions except
a. value added networks can compare passwords to a valid customer
b. prior to converting the message, the translation software of the rec password against
a validation file in the firm’s database
c. the recipient’s application software can validate the password PRIOR
d. the recipient’s application software can validate the password AFTER
D
All of the following tests of controls will provide evidence that adequate computer virus
control techniques are in place and functioning except
a. verifying that only authorized software is used on company computers
b. reviewing system maintenance records
c. confirming that antivirus software is in use
d. examining the password policy including a review of the authority table
B
Audit objectives for communications controls include all of the following except
a. detection and correction of message loss due to equipment failure
b. prevention and detection of illegal access to communication channels
c. procedures that render intercepted messages useless
d. all of the above
D
When auditors examine and test the call-back feature, they are testing which audit
objective?
a. incompatible functions have been segregated
b. application programs are protected from unauthorized access
c. physical security measures are adequate to protect the organization
d. illegal access to the system is prevented and detected
D
In an electronic data interchange (EDI) environment, when the auditor compares the
terms of the trading partner agreement against the access privileges stated in the
database authority table, the auditor is testing which audit objective?
a. all EDI transactions are authorized
b. unauthorized trading partners cannot gain access to database reco
c. authorized trading partners have access only to approved data
d. a complete audit trail is maintained
C
In determining whether a system is adequately protected from attacks by computer
viruses, all of the following policies are relevant except
a. the policy on the purchase of software only from reputable vendors
b. the policy that all software upgrades are checked for viruses before
c. the policy that current versions of antivirus software should be ava
d. the policy that permits users to take files home to work on them
D
In an electronic data interchange environment, customers routinely
a. access the vendor’s accounts receivable file with read/write author
b. access the vendor’s price list file with read/write authority
c. access the vendor’s inventory file with read-only authority
d. access the vendor’s open purchase order file with read-only authori
C
In an electronic data interchange environment, the audit trail
a. is a printout of all incoming and outgoing transactions
b. is an electronic log of all transactions received, translated, and processed by
the system
c. is a computer resource authority table
d. consists of pointers and indexes within the database
B
All of the following are designed to control exposuresfrom subversive threats except
a. Firewalls
b. one-time passwords
c. field interrogation
d. data encryption
C
Many techniques exist to reduce the likelihood and effects of data communication
hardware failure. One of these is
a. hardware access procedures
b. antivirus software
c. parity checks
d. data encryption
C
Which of the following deal with transaction legitimacy?
a. transaction authorization and validation
b. access controls
c. EDI audit trail
d. all of the above
D
Firewalls are
a. special materials used to insulate computer facilities
b. a system that enforces access control between two networks
c. special software used to screen Internet access
d. none of the above
B
Which of the following is true?
a. Deep Packet Inspection uses a variety of analytical and statistical techniques to
evaluate the contents of message packets.
b. An Intrusion prevention system works in parallel with a firewall at t filer that removes
malicious packets from the flow before they can
c. A distributed denial of service attack is so named because it is cap simultaneously
who are distributed across the internet.
d. None of the above are true statements.
A
A system of computers that connects the internal users of an organization that is
distributed over a wide geographic area is a(n)
a. LAN
b. decentralized network
c. multidrop network
d. Intranet
D