chapter 3 | mcq Flashcards
The operating system performs all of the following tasks except
a. translates third-generation languages into machine language
b. assigns memory to applications
c. authorizes user access
d. schedules job processing
c. authorizes user access
Which of the following is considered an unintentional threat to the integrity of the operating system?
a. a hacker gaining access to the system because of a security flaw
b. a hardware flaw that causes the system to crash
c. a virus that formats the hard drive
d. the systems programmer accessing individual user files
b. a hardware flaw that causes the system to crash
A software program that replicates itself in areas of idle memory until the system fails is called a
a. Trojan horse
b. worm
c. logic bomb
d. none of the above
b. worm
A software program that allows access to a system without going through the normal logon procedures is called a
a. logic bomb
b. Trojan horse
c. worm
d. back door
d. back door
All of the following will reduce the exposure to computer viruses except
a. install antivirus software
b. install factory-sealed application software
c. assign and control user passwords
d. install public-domain software from reputable bulletin boards
d. install public-domain software from reputable bulletin boards
Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host’s network using a technique called
a. spoofing.
b. spooling.
c. dual-homed.
d. screening.
a. spoofing.
Which is not a biometric device?
a. password
b. retina prints
c. voice prints
d. signature characteristics
a. password
All of the following are objectives of operating system control except
a. protecting the OS from users
b. protesting users from each other
c. protecting users from themselves
d. protecting the environment from users
d. protecting the environment from users
Passwords are secret codes that users enter to gain access to systems. Security can be compromised by all of the following except
a. failure to change passwords on a regular basis
b. using obscure passwords unknown to others
c. recording passwords in obvious places
d. selecting passwords that can be easily detected by computer criminals
b. using obscure passwords unknown to others
Audit trails cannot be used to
a. detect unauthorized access to systems
b. facilitate reconstruction of events
c. reduce the need for other forms of security
d. promote personal accountability
c. reduce the need for other forms of security
Which control will not reduce the likelihood of data loss due to a line error?
a. echo check
b. encryption
c. vertical parity bit
d. horizontal parity bit
b. encryption
Which method will render useless data captured by unauthorized receivers?
a. echo check
b. parity bit
c. public key encryption
d. message sequencing
c. public key encryption
Which method is most likely to detect unauthorized access to the system?
a. message transaction log
b. data encryption standard
c. vertical parity check
d. request-response technique
a. message transaction log
All of the following techniques are used to validate electronic data interchange transactions except
a. value added networks can compare passwords to a valid customer file before message transmission
b. prior to converting the message, the translation software of the receiving company can compare the password against a validation file in the firm’s database
c. the recipient’s application software can validate the password prior to processing
d. the recipient’s application software can validate the password after the transaction has been processed
d. the recipient’s application software can validate the password after the transaction has been processed
In an electronic data interchange environment, customers routinely access
a. the vendor’s price list file
b. the vendor’s accounts payable file
c. the vendor’s open purchase order file
d. none of the above
a. the vendor’s price list file
All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except
a. verifying that only authorized software is used on company computers
b. reviewing system maintenance records
c. confirming that antivirus software is in use
d. examining the password policy including a review of the authority table
b. reviewing system maintenance records
Audit objectives for communications controls include all of the following except
a. detection and correction of message loss due to equipment failure
b. prevention and detection of illegal access to communication channels
c. procedures that render intercepted messages useless
d. all of the above
d. all of the above
When auditors examine and test the call-back feature, they are testing which audit objective?
a. incompatible functions have been segregated
b. application programs are protected from unauthorized access
c. physical security measures are adequate to protect the organization from natural disaster
d. illegal access to the system is prevented and detected
d. illegal access to the system is prevented and detected
In an electronic data interchange (EDI) environment, when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table, the auditor is testing which audit objective?
a. all EDI transactions are authorized
b. unauthorized trading partners cannot gain access to database records
c. authorized trading partners have access only to approved data
d. a complete audit trail is maintained
c. authorized trading partners have access only to approved data
Audit objectives in the electronic data interchange (EDI) environment include all of the following except
a. all EDI transactions are authorized
b. unauthorized trading partners cannot gain access to database records
c. a complete audit trail of EDI transactions is maintained
d. backup procedures are in place and functioning properly
d. backup procedures are in place and functioning properly
In determining whether a system is adequately protected from attacks by computer viruses, all of the following policies are relevant except
a. the policy on the purchase of software only from reputable vendors
b. the policy that all software upgrades are checked for viruses before they are implemented
c. the policy that current versions of antivirus software should be available to all users
d. the policy that permits users to take files home to work on them
d. the policy that permits users to take files home to work on them
Which of the following is not a test of access controls?
a. biometric controls
b. encryption controls
c. backup controls
d. inference controls
c. backup controls