chapter 3 | tf Flashcards

1
Q

In a computerized environment, the audit trail log must be printed onto paper documents.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Disguising message packets to look as if they came from another user and to gain access to the host’s network is called spooling.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A formal log-on procedure is the operating system’s last line of defense against unauthorized access.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer viruses usually spread throughout the system before being detected.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A worm is software program that replicates itself in areas of idle memory until the system fails.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Viruses rarely attach themselves to executable files.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Operating system controls are of interest to system professionals but should not
concern accountants and auditors.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The most frequent victims of program viruses are microcomputers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Operating system integrity is not of concern to accountants because only hardware risks are involved.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In a telecommunications environment, line errors can be detected by using an echo check.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firewalls are special materials used to insulate computer facilities

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The message authentication code is calculated by the sender and the receiver of a data transmission.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The request-response technique should detect if a data communication transmission has been diverted.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Electronic data interchange translation software interfaces with the sending firm and the value added network.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A value added network can detect and reject transactions by unauthorized trading partners.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Electronic data interchange customers may be given access to the vendor’s data files.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The audit trail for electronic data interchange transactions is stored on magnetic media.

A

True

19
Q

A firewall is a hardware partition designed to protect networks from power surges.

A

False

20
Q

To preserve audit trails in a computerized environment, transaction logs are permanent records of transaction.

A

True

21
Q

Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating sub-schemas.

A

True

22
Q

The standard format for an e-mail address is DOMAIN NAME@USER NAME.

A

False

23
Q

The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.

A

True

24
Q

IP spoofing is a form of masquerading to gain unauthorized access to a Web server.

A

True

25
Q

The rules that make it possible for users of networks to communicate are called protocols.

A

True

26
Q

A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.

A

True

27
Q

Cookies are files created by user computers and stored on Web servers.

A

False

28
Q

Because of network protocols, users of networks built by different manufacturers are able to communicate and share data.

A

True

29
Q

The client-server model can only be applied to ring and star topologies.

A

False

30
Q

Only two types of motivation drive DoS attacks: 1) to punish an organization with which the perpetrator had a grievance; and 2) to gain bragging rights for being able to do it.

A

False

31
Q

A distributed denial of service (DDoS) attack may take the form of a SYN flood but not a smurf attack.

A

False

32
Q

The bus topology connects the nodes in parallel.

A

True

33
Q

A network topology is the physical arrangement of the components of the network.

A

True

34
Q

A digital signature is a digital copy of the sender’s actual signature that cannot be forged.

A

False

35
Q

A bus topology is less costly to install than a ring topology.

A

True

36
Q

A smurf attack involves three participants: a zombie, an intermediary, and the victim.

A

False

37
Q

In a hierarchical topology, network nodes communicate with each other via a central host computer.

A

True

38
Q

Polling is one technique used to control data collisions.

A

True

39
Q

The more individuals that need to exchange encrypted data, the greater the chance that the key will become known to an intruder. To overcome this problem, private key encryption was devised.

A

False

40
Q

The intermediary in a smurf attack is also a victim.

A

True

41
Q

A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.

A

True

42
Q

HTML tags are customized to delimit attributes, the content of which can be read and processed by computer applications.

A

False

43
Q

A ping is an Internet maintenance tool that is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.

A

True