Chapter 3 Flashcards
The computer’s control program.
Operating System
Common computer resources includes:
a. processors
b. main memory
c. databases
d. printers
e. AOTA
e. AOTA
The larger the computer facility, the greater the scale of potential damage.
TRUE
High-level languages:
a. COBOL
b. C++
c. BASIC
d. SQL
e. AOTA
e. AOTA
The language translator modules of the operating system.
a. compilers and interpreters
b. controllers and interpreters
c. compilers and translators
d. controllers and translators
e. NOTA
a. compilers and interpreters
The operating system’s first line of defense against unauthorized access.
a. access control list
b. access token
c. log-on procedure
d. discretionary access privilege
e. NOTA
c. log-on procedure
Contains key information about the user, including user ID, password, user group, and privileges granted to the user.
a. access control list
b. access token
c. log-on procedure
d. discretionary access privilege
e. NOTA
b. access token
Assigned to each IT resource which controls access to the resources.
a. access control list
b. access token
c. log-on procedure
d. discretionary access privilege
e. NOTA
a. access control list
Allows resource owners to grant access privileges to other users.
a. access token
b. discretionary access privileges
c. access control list
d. log-on procedure
e. NOTA
b. discretionary access privileges
Intentional threats include hardware failures that cause the operating system to crash.
FALSE. Accidental threats
Exposures to intentional threats come from three sources which includes:
a. Privilege personnel who abuse their authority
b. Individuals who browse the operating system to identify and exploit security flaws
c. Individuals who intentionally insert computer viruses or other forms of destructive programs into the operating system
d. AOTA
e. NOTA
d. AOTA
The auditor’s objective is to verify that access privileges are granted in a manner that is consistent with the need to separate incompatible functions and is in accordance with the organization’s policy.
Audit Objective Relating to Access Privileges
A secret code the user enters to gain access to systems, applications, data files, or a network server.
Password
The most common forms of contra security behavior includes
a. the Post-it Syndrome
b. failing to change passwords on a frequent basis
c. forgetting passwords and being locked out of the system
d. simplistic passwords that a computer criminal easily anticipates
e. AOTA
e. AOTA
The most common method of password control.
Reusable Passwords