Information Technology Auditing 4th Edition By James A.Hall – Test Bank
To Purchase
this Complete Test Bank with Answers Click the link Below
https://tbzuiqe.com/product/information-technology-auditing-4th-edition-by-james-a-hall-test-bank/
If face any problem or
Further information contact us At tbzuiqe@gmail.com
Sample
Test
Chapter 3—Security Part I: Auditing Operating Systems and
Networks
TRUE/FALSE
1. In a
computerized environment, the audit trail log must be printed onto paper documents.
ANS:
F
PTS: 1
2. Disguising
message packets to look as if they came from another user and to gain access to
the host’s network is called spooling.
ANS:
F
PTS: 1
3. A
formal log-on procedure is the operating system’s last line of defense against
unauthorized access.
ANS:
F
PTS: 1
4. Computer
viruses usually spread throughout the system before being detected.
ANS:
T
PTS: 1
5. A
worm is software program that replicates itself in areas of idle memory until
the system fails.
ANS:
T
PTS: 1
6. Viruses
rarely attach themselves to executable files.
ANS:
F
PTS: 1
7. Operating
system controls are of interest to system professionals but should not concern
accountants and auditors.
ANS:
F
PTS: 1
8. The
most frequent victims of program viruses are microcomputers.
ANS:
T
PTS: 1
9. Audit
trails in computerized systems are comprised of two types of audit logs:
detailed logs of individual keystrokes and event-oriented logs.
ANS:
T
PTS: 1
10. In a
telecommunications environment, line errors can be detected by using an echo
check.
ANS:
T
PTS: 1
11. The
message authentication code is calculated by the sender and the receiver of a
data transmission.
ANS:
T
PTS: 1
12. The
request-response technique should detect if a data communication transmission
has been diverted.
ANS:
T
PTS: 1
13. Electronic
data interchange translation software interfaces with the sending firm and the
value added network.
ANS:
F
PTS: 1
14. A
value added network can detect and reject transactions by unauthorized trading
partners.
ANS:
T
PTS: 1
15. Electronic
data interchange customers may be given access to the vendor’s data files.
ANS:
T
PTS: 1
16. The
audit trail for electronic data interchange transactions is stored on magnetic
media.
ANS:
T
PTS: 1
17. A
firewall is a hardware partition designed to protect networks from power
surges.
ANS:
F
PTS: 1
18. To
preserve audit trails in a computerized environment, transaction logs are
permanent records of transactions.
ANS:
T
PTS: 1
19. The
network paradox is that networks exist to provide user access to shared
resources while one of its most important objectives is to control access.
ANS:
T
PTS: 1
20. IP
spoofing is a form of masquerading to gain unauthorized access to a Web server.
ANS:
T
PTS: 1
21. The
rules that make it possible for users of networks to communicate are called
protocols.
ANS:
T
PTS: 1
22. A
factor that contributes to computer crime is the reluctance of many
organizations to prosecute criminals for fear of negative publicity.
ANS:
T
PTS: 1
23. Because
of network protocols, users of networks built by different manufacturers are
able to communicate and share data.
ANS:
T
PTS: 1
24. The
client-server model can only be applied to ring and star topologies.
ANS: F
PTS: 1
25. Only
two types of motivation drive DoS attacks: 1) to punish an organization
with which the perpetrator had a grievance; and 2) to gain bragging rights for
being able to do it.
ANS:
F
PTS: 1
26. The
bus topology connects the nodes in parallel.
ANS:
T
PTS: 1
27. A
network topology is the physical arrangement of the components of the network.
ANS:
T
PTS: 1
28. A
digital signature is a digital copy of the sender’s actual signature that
cannot be forged.
ANS:
F
PTS: 1
29. A
smurf attack involves three participants: a zombie, an intermediary, and the
victim.
ANS:
F
PTS: 1
30. In a
hierarchical topology, network nodes communicate with each other via a central
host computer.
ANS:
T
PTS: 1
31. Polling
is one technique used to control data collisions.
ANS:
T
PTS: 1
32. The
more individuals that need to exchange encrypted data, the greater the chance
that the key will become known to an intruder. To overcome this problem,
private key encryption was devised.
ANS:
F
PTS: 1
33. A
ping is used to test the state of network congestion and determine whether a
particular host computer is connected and available on the network.
ANS:
T
PTS: 1
34. HTML
tags are customized to delimit attributes, the content of which can be read and
processed by computer applications.
ANS:
F
PTS: 1
MULTIPLE CHOICE
1. The
operating system performs all of the following tasks except
a. |
translates third-generation
languages into machine language |
b. |
assigns memory to
applications |
c. |
authorizes user access |
d. |
schedules job processing |
ANS:
C
PTS: 1
2. Which
of the following is considered an unintentional threat to the integrity of the
operating system?
a. |
a hacker gaining access to
the system because of a security flaw |
b. |
a hardware flaw that causes
the system to crash |
c. |
a virus that formats the
hard drive |
d. |
the systems programmer
accessing individual user files |
ANS:
B
PTS: 1
3. A
software program that replicates itself in areas of idle memory until the
system fails is called a
a. |
Trojan horse |
b. |
worm |
c. |
logic bomb |
d. |
none of the above |
ANS:
B
PTS: 1
4. A
software program that allows access to a system without going through the
normal logon procedures is called a
a. |
logic bomb |
b. |
Trojan horse |
c. |
worm |
d. |
back door |
ANS:
D
PTS: 1
5. All
of the following will reduce the exposure to computer viruses except
a. |
install antivirus software |
b. |
install factory-sealed application
software |
c. |
assign and control user
passwords |
d. |
install public-domain
software from reputable bulletin boards |
ANS:
D
PTS: 1
6. Hackers
can disguise their message packets to look as if they came from an authorized
user and gain access to the host’s network using a technique called
a. |
spoofing. |
b. |
spooling. |
c. |
dual-homed. |
d. |
screening. |
ANS:
A
PTS: 1
7. Passwords
are secret codes that users enter to gain access to systems. Security can be
compromised by all of the following except
a. |
failure to change passwords
on a regular basis |
b. |
using obscure passwords
unknown to others |
c. |
recording passwords in
obvious places |
d. |
selecting passwords that
can be easily detected by computer criminals |
ANS:
B
PTS: 1
8. Which
control will not reduce the likelihood of data loss due to a line error?
a. |
echo check |
b. |
encryption |
c. |
vertical parity bit |
d. |
horizontal parity bit |
ANS: B
PTS: 1
9. Which
method will render useless data captured by unauthorized receivers?
a. |
echo check |
b. |
parity bit |
c. |
public key encryption |
d. |
message sequencing |
ANS:
C
PTS: 1
10. Which
method is most likely to detect unauthorized access to the system?
a. |
message transaction log |
b. |
data encryption standard |
c. |
vertical parity check |
d. |
request-response technique |
ANS:
A
PTS: 1
11. All
of the following techniques are used to validate electronic data interchange
transactions except
a. |
value added networks can
compare passwords to a valid customer file before message transmission |
b. |
prior to converting the
message, the translation software of the receiving company can compare the
password against a validation file in the firm’s database |
c. |
the recipient’s application
software can validate the password prior to processing |
d. |
the recipient’s application
software can validate the password after the transaction has been processed |
ANS:
D
PTS: 1
12. All
of the following tests of controls will provide evidence that adequate computer
virus control techniques are in place and functioning except
a. |
verifying that only
authorized software is used on company computers |
b. |
reviewing system
maintenance records |
c. |
confirming that antivirus
software is in use |
d. |
examining the password
policy including a review of the authority table |
ANS:
B
PTS: 1
13. Audit
objectives for communications controls include all of the following except
a. |
detection and correction of
message loss due to equipment failure |
b. |
prevention and detection of
illegal access to communication channels |
c. |
procedures that render
intercepted messages useless |
d. |
all of the above |
ANS:
D
PTS: 1
14. When
auditors examine and test the call-back feature, they are testing which audit
objective?
a. |
incompatible functions have
been segregated |
b. |
application programs are
protected from unauthorized access |
c. |
physical security measures
are adequate to protect the organization from natural disaster |
d. |
illegal access to the
system is prevented and detected |
ANS:
D
PTS: 1
15. In an
electronic data interchange (EDI) environment, when the auditor compares the
terms of the trading partner agreement against the access privileges stated in
the database authority table, the auditor is testing which audit objective?
a. |
all EDI transactions are
authorized |
b. |
unauthorized trading
partners cannot gain access to database records |
c. |
authorized trading partners
have access only to approved data |
d. |
a complete audit trail is
maintained |
ANS:
C
PTS: 1
16. In
determining whether a system is adequately protected from attacks by computer
viruses, all of the following policies are relevant except
a. |
the policy on the purchase
of software only from reputable vendors |
b. |
the policy that all
software upgrades are checked for viruses before they are implemented |
c. |
the policy that current
versions of antivirus software should be available to all users |
d. |
the policy that permits
users to take files home to work on them |
ANS:
D
PTS: 1
17. In an
electronic data interchange environment, customers routinely
a. |
access the vendor’s
accounts receivable file with read/write authority |
b. |
access the vendor’s price
list file with read/write authority |
c. |
access the vendor’s
inventory file with read-only authority |
d. |
access the vendor’s open
purchase order file with read-only authority |
ANS:
C
PTS: 1
18. In an
electronic data interchange environment, the audit trail
a. |
is a printout of all
incoming and outgoing transactions |
b. |
is an electronic log of all
transactions received, translated, and processed by the system |
c. |
is a computer resource
authority table |
d. |
consists of pointers and
indexes within the database |
ANS:
B
PTS: 1
19. All
of the following are designed to control exposures from subversive threats
except
a. |
firewalls |
b. |
one-time passwords |
c. |
field interrogation |
d. |
data encryption |
ANS:
C
PTS: 1
20. Many
techniques exist to reduce the likelihood and effects of data communication
hardware failure. One of these is
a. |
hardware access procedures |
b. |
antivirus software |
c. |
parity checks |
d. |
data encryption |
ANS:
C
PTS: 1
21. Which
of the following deal with transaction legitimacy?
a. |
transaction authorization
and validation |
b. |
access controls |
c. |
EDI audit trail |
d. |
all of the above |
ANS:
D
PTS: 1
22. Firewalls
are
a. |
special materials used to
insulate computer facilities |
b. |
a system that enforces
access control between two networks |
c. |
special software used to
screen Internet access |
d. |
none of the above |
ANS:
B
PTS: 1
23. Which
of the following is true?
a. |
Deep Packet Inspection uses
a variety of analytical and statistical techniques to evaluate the contents
of message packets. |
b. |
An Intrusion prevention
system works in parallel with a firewall at the perimeter of the network to
act as a filer that removes malicious packets from the flow before they can
affect servers and networks. |
c. |
A distributed denial of
service attack is so named because it is capable of attacking many victims
simultaneously who are distributed across the internet. |
d. |
None of the above are true
statements. |
ANS: A
PTS: 1
24. A
system of computers that connects the internal users of an organization that is
distributed over a wide geographic area is a(n)
a. |
LAN |
b. |
decentralized network |
c. |
multidrop network |
d. |
Intranet |
ANS: D
PTS: 1
25. Network
protocols fulfill all of the following objectives except
a. |
facilitate physical
connection between network devices |
b. |
provide a basis for error
checking and measuring network performance |
c. |
promote compatibility among
network devices |
d. |
result in inflexible
standards |
ANS:
D
PTS: 1
26. To
physically connect a workstation to a LAN requires a
a. |
file server |
b. |
network interface card |
c. |
multiplexer |
d. |
bridge |
ANS: B
PTS: 1
27. Packet
switching
a. |
combines the messages of
multiple users into one packet for transmission. At the receiving end, the
packet is disassembled into the individual messages and distributed to the
intended users. |
b. |
is a method for
partitioning a database into packets for easy access where no identifiable
primary user exists in the organization. |
c. |
is used to establish
temporary connections between network devices for the duration of a
communication session. |
d. |
is a denial of service
technique that disassembles various incoming messages to targeted users into
small packages and then reassembles them in random order to create a useless
garbled message. |
ANS:
C
PTS: 1
28. A
virtual private network:
a. |
is a
password-controlled network for private users rather than the general public. |
b. |
is a private network
within a public network. |
c. |
is an Internet
facility that links user sites locally and around the world. |
d. |
defines the path to a
facility or file on the web. |
e. |
none of the above is
true. |
ANS:
B
PTS: 1
29. A
ping signal is used to initiate
a. |
URL masquerading |
b. |
digital signature
forging |
c. |
Internet protocol
spoofing |
d. |
a smurf attack |
e. |
none of the above is
true |
ANS:
D
PTS: 1
30. In a
star topology, when the central site fails
a. |
individual workstations can
communicate with each other |
b. |
individual workstations can
function locally but cannot communicate with other workstations |
c. |
individual workstations
cannot function locally and cannot communicate with other workstations |
d. |
the functions of the
central site are taken over by a designated workstation |
ANS: B
PTS: 1
31. Which
of the following statements is correct? The client-server model
a. |
is best suited to the
token-ring topology because the random-access method used by this model
detects data collisions. |
b. |
distributes both data and
processing tasks to the server’s node. |
c. |
is most effective used with
a bus topology. |
d. |
is more efficient than the
bus or ring topologies. |
ANS:
B
PTS: 1
32. A
star topology is appropriate
a. |
for a wide area network
with a mainframe for a central computer |
b. |
for centralized databases
only |
c. |
for environments where
network nodes routinely communicate with each other |
d. |
when the central database
does not have to be concurrent with the nodes |
ANS: A
PTS: 1
33. In a
ring topology
a. |
the network consists of a
central computer which manages all communications between nodes |
b. |
has a host computer
connected to several levels of subordinate computers |
c. |
all nodes are of equal status;
responsibility for managing communications is distributed among the nodes |
d. |
information processing
units rarely communicate with each other |
ANS:
C
PTS: 1
34. A
distributed denial of service (DDoS) attack
a. |
is more intensive that a
Dos attack because it emanates from single source |
b. |
may take the form of either
a SYN flood or smurf attack |
c. |
is so named because it
effects many victims simultaneously, which are distributed across the
internet |
d. |
turns the target victim’s
computers into zombies that are unable to access the Internet |
ANS:
B
PTS: 1
35. Which
of the following statements is correct? TCP/IP
a. |
is the basic protocol that
permits communication between Internet sites. |
b. |
controls Web browsers that
access the WWW. |
c. |
is the file format used to
produce Web pages. |
d. |
is a low-level encryption
scheme used to secure transmissions in HTTP format. |
ANS:
A
PTS: 1
36. FTP
a. |
is the document format used
to produce Web pages. |
b. |
controls Web browsers that
access the Web. |
c. |
is used to connect to
Usenet groups on the Internet |
d. |
is used to transfer text
files, programs, spreadsheets, and databases across the Internet. |
e. |
is a low-level encryption scheme
used to secure transmissions in higher-level () format. |
ANS:
D
PTS: 1
37. IP
spoofing
a. |
combines the messages of
multiple users into a “spoofing packet” where the IP addresses are
interchanged and the messages are then distributes randomly among the
targeted users. |
b. |
is a form of masquerading
to gain unauthorized access to a web server. |
c. |
is used to establish
temporary connections between network devices with different IP addresses for
the duration of a communication session. |
d. |
is a temporary phenomenon
that disrupts transaction processing. It will resolve itself when the primary
computer completes processing its transaction and releases the IP address
needed by other users. |
ANS: B
PTS: 1
38. HTML
a. |
is the document format used
to produce Web pages. |
b. |
controls Web browsers that
access the Web. |
c. |
is used to connect to
Usenet groups on the Internet. |
d. |
is used to transfer text
files, programs, spreadsheets, and databases across the Internet. |
e. |
is a low-level encryption
scheme used to secure transmissions in higher-level () format. |
ANS:
A
PTS: 1
39. A
message that is made to look as though it is coming from a trusted source but
is not is called
a. |
a denial of service attack |
b. |
digital signature forging |
c. |
Internet protocol spoofing |
d. |
URL masquerading |
ANS:
C
PTS: 1
40. An IP
Address:
a. |
defines the path to a
facility or file on the web. |
b. |
is the unique address that
every computer node and host attached to the Internet must have. |
c. |
is represented by a 64-bit
data packet. |
d. |
is the address of the
protocol rules and standards that governing the design of internet hardware
and software. |
ANS:
B
PTS: 1
41. A
digital signature is
a. |
the encrypted mathematical
value of the message sender’s name |
b. |
derived from the digest of
a document that has been encrypted with the sender’s private key |
c. |
the computed digest of the
sender’s digital certificate |
d. |
allows digital messages to
be sent over analog telephone lines |
ANS:
B
PTS: 1
42. HTTP
a. |
is the document format used
to produce Web pages. |
b. |
controls Web browsers that access
the Web. |
c. |
is used to connect to
Usenet groups on the Internet |
d. |
is used to transfer text
files, programs, spreadsheets, and databases across the Internet. |
e. |
is a low-level encryption
scheme used to secure transmissions in higher-level () format. |
ANS:
B
PTS: 1
43. Which
of the following statements is correct?
a. |
Packet switching combines
the messages of multiple users into a “packet” for transmission. At the
receiving end, the packet is disassembled into the individual messages and
distributed to the intended users. |
b. |
The decision to partition a
database assumes that no identifiable primary user exists in the
organization. |
c. |
Packet switching is used to
establish temporary connections between network devices for the duration of a
communication session. |
d. |
A deadlock is a temporary
phenomenon that disrupts transaction processing. It will resolve itself when
the primary computer completes processing its transaction and releases the
data needed by other users. |
ANS:
C
PTS: 1
SHORT ANSWER
1. What
is a virus?
ANS:
A virus is a program that attaches itself to another legitimate
program in order to penetrate the operating system.
PTS: 1
2. List
three methods of controlling unauthorized access to telecommunication messages.
ANS:
call-back devices, data encryption, message sequence numbering,
message authentication codes, message transaction logs, and request-response
technique
PTS: 1
3. What
are some typical problems with passwords?
ANS:
users failing to remember passwords; failure to change passwords
frequently; displaying passwords where others can see them; using simple,
easy-to-guess passwords
PTS: 1
4. Discuss
the key features of the one-time password technique:
ANS:
The one-time password was designed to overcome the problems
associated with reusable passwords.
The user’s password changes continuously.
This technology employs a credit card-sized smart card that
contains a microprocessor programmed with an algorithm that generates, and
electronically displays, a new and unique password every 60 seconds.
The card works in conjunction with special authentication
software located on a mainframe or network server computer. Each user’s card is
synchronized to the authentication software, so that at any point in time both
the smart card and the network software are generating the same password for
the same user.
PTS: 1
5. What
is event monitoring?
ANS:
Event monitoring summarizes key activities related to system
resources. Event logs typically record the IDs of all users accessing the
system; the time and duration of a user’s session; programs that were executed
during a session; and the files, databases, printers, and other resources
accessed.
PTS: 1
Comments
Post a Comment