Chapter 3 Flashcards

1
Q

The computer’s control program.

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common computer resources includes:
a. processors
b. main memory
c. databases
d. printers
e. AOTA

A

e. AOTA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The larger the computer facility, the greater the scale of potential damage.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

High-level languages:
a. COBOL
b. C++
c. BASIC
d. SQL
e. AOTA

A

e. AOTA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The language translator modules of the operating system.
a. compilers and interpreters
b. controllers and interpreters
c. compilers and translators
d. controllers and translators
e. NOTA

A

a. compilers and interpreters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The operating system’s first line of defense against unauthorized access.
a. access control list
b. access token
c. log-on procedure
d. discretionary access privilege
e. NOTA

A

c. log-on procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Contains key information about the user, including user ID, password, user group, and privileges granted to the user.
a. access control list
b. access token
c. log-on procedure
d. discretionary access privilege
e. NOTA

A

b. access token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Assigned to each IT resource which controls access to the resources.
a. access control list
b. access token
c. log-on procedure
d. discretionary access privilege
e. NOTA

A

a. access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Allows resource owners to grant access privileges to other users.
a. access token
b. discretionary access privileges
c. access control list
d. log-on procedure
e. NOTA

A

b. discretionary access privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intentional threats include hardware failures that cause the operating system to crash.

A

FALSE. Accidental threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exposures to intentional threats come from three sources which includes:
a. Privilege personnel who abuse their authority
b. Individuals who browse the operating system to identify and exploit security flaws
c. Individuals who intentionally insert computer viruses or other forms of destructive programs into the operating system
d. AOTA
e. NOTA

A

d. AOTA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The auditor’s objective is to verify that access privileges are granted in a manner that is consistent with the need to separate incompatible functions and is in accordance with the organization’s policy.

A

Audit Objective Relating to Access Privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A secret code the user enters to gain access to systems, applications, data files, or a network server.

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The most common forms of contra security behavior includes
a. the Post-it Syndrome
b. failing to change passwords on a frequent basis
c. forgetting passwords and being locked out of the system
d. simplistic passwords that a computer criminal easily anticipates
e. AOTA

A

e. AOTA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The most common method of password control.

A

Reusable Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Under this approach the users password changes continuously.

A

One-Time Passwords (OTP)

17
Q

The auditor’s objective is to verify that effective management policies and procedures are in place to prevent the introduction and spread of destructive programs including viruses, worms, back doors, logic bombs, and Trojan horses.

A

Audit Objective Relating to Viruses and Other Destructive Programs

18
Q

Logs that record activity at the system, application, and user level.

A

System Audit Trail Control

19
Q

Two types of audit logs

A
  1. Detailed logs of individual keystrokes
  2. Event-oriented logs
20
Q

Which of the following is true about keystroke monitoring?
a. It involves recording both the user’s keystrokes and the system’s responses.
b. It may be used after the fact to reconstruct the details of an event or as a real-time control to prevent unauthorized intrusion.
c. It is the computer equivalent of a telephone wiretap.
d. AOTA
e. NOTA

A

d. AOTA

21
Q

Summarizes key activities related to system resources.

A

Event Monitoring

22
Q

Event logs typically record the:
a. ID’s of all users accessing the system
b. the time and duration of a user’s session
c. programs that were executed during a session
d. and the files, databases, printers, and other resources accessed
e. AOTA

A

e. AOTA

23
Q

Audit trails can be used to support the following security objectives except:
a. Detecting an authorized access to the system
b. Promoting personal accountability
c. Facilitating the reconstruction of events
d. NOTA

A

d. NOTA

24
Q

The COSO framework consists of five components.

A
  1. the control environment
  2. risk assessment
  3. information and communication
  4. monitoring
  5. control activities.
25
Q

It is the foundation for the other four control components which sets the tone for the organization and influences the control awareness
of its management and employees.
a. the control environment
b. risk assessment
c. information and communication
d. monitoring
e. control activities

A

a. the control environment