Preview

Auditing Operating Systems and Networks Question Paper

Better Essays
Open Document
Open Document
3404 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Auditing Operating Systems and Networks Question Paper
Chapter 3—Security Part I: Auditing Operating Systems and Networks
TRUE/FALSE

1. In a computerized environment, the audit trail log must be printed onto paper document.

2. Disguising message packets to look as if they came from another user and to gain access to the host’s network is called spooling.

3. A formal log-on procedure is the operating system’s last line of defense against unauthorized access.

4. Computer viruses usually spread throughout the system before being detected.

5. A worm is software program that replicates itself in areas of idle memory until the system fails.

6. Viruses rarely attach themselves to executable files.

10. Operating system controls are of interest to system professionals but should not concern accountants and auditors.

11. The most frequent victims of program viruses are microcomputers.

13. Operating system integrity is not of concern to accountants because only hardware risks are involved.

14. Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.

15. In a telecommunications environment, line errors can be detected by using an echo check.

16. Firewalls are special materials used to insulate computer facilities

17. The message authentication code is calculated by the sender and the receiver of a data transmission.

18. The request-response technique should detect if a data communication transmission has been diverted.

19. Electronic data interchange translation software interfaces with the sending firm and the value added network.

20. A value added network can detect and reject transactions by unauthorized trading partners.

21. Electronic data interchange customers may be given access to the vendor's data files.

22. The audit trail for electronic data interchange transactions is stored on magnetic media.

23. A firewall is a hardware partition designed to protect networks from power surges.

24. To preserve

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    b. SYN-ACK: In response, the server replies with a SYN-ACK. The acknowledgment number is set to one more than the received sequence number, and the sequence number that the server chooses for the packet is another random number.…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    • Technical controls (such as smart cards, audit trails or access logs, intrusion detection, alarm systems, and biometrics)…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    * Authentication failures are one type of security event. A baseline anomalies that may indicate suspicious activity are unauthorized access attempts that can be found within log files. The log files contain records of all types of security events such as logon events, changes in system configuration and attempted violations of policy as well as system events like service startups and closures, errors and system warnings.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    There are several different types of controls that you can take advantage of for securing your servers. Below are official guidelines from the (National Institute for Standards and Technology), or NIST.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    |E-mail worms – A worm that spreads through the user of the user’s email account(s). |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    3) Authentication: Verifying the identity of the person or device attempting to access the system.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    New auditing features in Windows 7 and Windows Server 2008 R2 make it easier to audit important user, computer, and network activities in a focused, efficient manner. These features…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    | Describe the security issues that may threaten system performanceThe possible threats to system performance may be: unwanted e-mail (‘spam’), malicious programs (including viruses, trojans) and hackers. Security precautions can be taken beforehand such as use of access controls. We can configure anti-virus software, adjust firewall settings, adjust internet security settings; backup; store personal data and software safely; treat messages, files, software and attachments from unknown sources with caution; download security software updates.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Log Files encompass complete records of all security events (logon events, resource access, attempted violations of policy, and changes in system configuration or policies) and critical system events (service/daemon start/stop, errors generated, system warnings) that can allow an administrator to quickly discover the root cause of any issues.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    Audit trail keeps a record of every piece of data item and when it entered the system. In addition to recording the original the source, an audit trail must show how and when data is accessed or changed, and by whom (Shelly & Rosenblatt, 2012). Companies will benefit having an audit trail as it provide documentation of all documents received and pass between departments. The following will give examples of audit trails input controls:…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    * Noted exceptions: Unix, Linux or Mac OS operating systems do not have supported anti-virus software supplied by the company, it is the responsibility of the owner/operator of the Unix, Linux, or Mac Os system to protect their system from viruses.…

    • 1030 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Cost of paperwork has also been reduced by the use of Electronic Data Interchange. This means payments and transfer of documents from one computer to another which have been interlinked can be done electronically.…

    • 578 Words
    • 3 Pages
    Good Essays