chapter 3 | tf Flashcards
In a computerized environment, the audit trail log must be printed onto paper documents.
False
Disguising message packets to look as if they came from another user and to gain access to the host’s network is called spooling.
False
A formal log-on procedure is the operating system’s last line of defense against unauthorized access.
False
Computer viruses usually spread throughout the system before being detected.
True
A worm is software program that replicates itself in areas of idle memory until the system fails.
True
Viruses rarely attach themselves to executable files.
False
Operating system controls are of interest to system professionals but should not
concern accountants and auditors.
False
The most frequent victims of program viruses are microcomputers.
True
Operating system integrity is not of concern to accountants because only hardware risks are involved.
False
Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.
True
In a telecommunications environment, line errors can be detected by using an echo check.
True
Firewalls are special materials used to insulate computer facilities
False
The message authentication code is calculated by the sender and the receiver of a data transmission.
True
The request-response technique should detect if a data communication transmission has been diverted.
True
Electronic data interchange translation software interfaces with the sending firm and the value added network.
False
A value added network can detect and reject transactions by unauthorized trading partners.
True
Electronic data interchange customers may be given access to the vendor’s data files.
True
The audit trail for electronic data interchange transactions is stored on magnetic media.
True
A firewall is a hardware partition designed to protect networks from power surges.
False
To preserve audit trails in a computerized environment, transaction logs are permanent records of transaction.
True
Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating sub-schemas.
True
The standard format for an e-mail address is DOMAIN NAME@USER NAME.
False
The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.
True
IP spoofing is a form of masquerading to gain unauthorized access to a Web server.
True