Information Technology Auditing 4th Edition James A Hall- Test Bank
To Purchase this Complete Test Bank with Answers Click the link Below
https://tbzuiqe.com/product/information-technology-auditing-4th-edition-james-a-hall-test-bank/
If face any problem or
Further information contact us At tbzuiqe@gmail.com
Sample Test
Chapter 3—Security Part I: Auditing Operating Systems and
Networks
TRUE/FALSE
1. In a
computerized environment, the audit trail log must be printed onto paper documents.
ANS:
F
PTS: 1
2. Disguising
message packets to look as if they came from another user and to gain access to
the host’s network is called spooling.
ANS:
F
PTS: 1
3. A
formal log-on procedure is the operating system’s last line of defense against
unauthorized access.
ANS:
F
PTS: 1
4. Computer
viruses usually spread throughout the system before being detected.
ANS:
T
PTS: 1
5. A
worm is software program that replicates itself in areas of idle memory until
the system fails.
ANS:
T
PTS: 1
6. Viruses
rarely attach themselves to executable files.
ANS:
F
PTS: 1
7. Operating
system controls are of interest to system professionals but should not concern
accountants and auditors.
ANS:
F
PTS: 1
8. The
most frequent victims of program viruses are microcomputers.
ANS:
T
PTS: 1
9. Audit
trails in computerized systems are comprised of two types of audit logs:
detailed logs of individual keystrokes and event-oriented logs.
ANS:
T
PTS: 1
10.
In a telecommunications environment, line errors can be detected
by using an echo check.
ANS:
T
PTS: 1
11.
The message authentication code is calculated by the sender and
the receiver of a data transmission.
ANS:
T
PTS: 1
12.
The request-response technique should detect if a data communication
transmission has been diverted.
ANS:
T
PTS: 1
13.
Electronic data interchange translation software interfaces with
the sending firm and the value added network.
ANS:
F
PTS: 1
14.
A value added network can detect and reject transactions by
unauthorized trading partners.
ANS:
T
PTS: 1
15.
Electronic data interchange customers may be given access to the
vendor’s data files.
ANS:
T
PTS: 1
16.
The audit trail for electronic data interchange transactions is
stored on magnetic media.
ANS:
T
PTS: 1
17.
A firewall is a hardware partition designed to protect networks
from power surges.
ANS:
F
PTS: 1
18.
To preserve audit trails in a computerized environment,
transaction logs are permanent records of transactions.
ANS:
T
PTS: 1
19.
The network paradox is that networks exist to provide user
access to shared resources while one of its most important objectives is to
control access.
ANS:
T
PTS: 1
20.
IP spoofing is a form of masquerading to gain unauthorized
access to a Web server.
ANS:
T
PTS: 1
21.
The rules that make it possible for users of networks to
communicate are called protocols.
ANS:
T
PTS: 1
22.
A factor that contributes to computer crime is the reluctance of
many organizations to prosecute criminals for fear of negative publicity.
ANS: T
PTS: 1
23.
Because of network protocols, users of networks built by
different manufacturers are able to communicate and share data.
ANS:
T
PTS: 1
24.
The client-server model can only be applied to ring and star
topologies.
ANS:
F
PTS: 1
25.
Only two types of motivation drive DoS attacks: 1) to
punish an organization with which the perpetrator had a grievance; and 2) to
gain bragging rights for being able to do it.
ANS:
F
PTS: 1
26.
The bus topology connects the nodes in parallel.
ANS:
T
PTS: 1
27.
A network topology is the physical arrangement of the components
of the network.
ANS:
T
PTS: 1
28.
A digital signature is a digital copy of the sender’s actual
signature that cannot be forged.
ANS:
F
PTS: 1
29.
A smurf attack involves three participants: a zombie, an
intermediary, and the victim.
ANS:
F
PTS: 1
30.
In a hierarchical topology, network nodes communicate with each
other via a central host computer.
ANS:
T
PTS: 1
31.
Polling is one technique used to control data collisions.
ANS:
T
PTS: 1
32.
The more individuals that need to exchange encrypted data, the
greater the chance that the key will become known to an intruder. To
overcome this problem, private key encryption was devised.
ANS:
F
PTS: 1
33.
A ping is used to test the state of network congestion and
determine whether a particular host computer is connected and available on the
network.
ANS:
T
PTS: 1
34.
HTML tags are customized to delimit attributes, the content of
which can be read and processed by computer applications.
ANS:
F
PTS: 1
MULTIPLE CHOICE
1. The
operating system performs all of the following tasks except
a. |
translates third-generation languages
into machine language |
b. |
assigns memory to applications |
c. |
authorizes user access |
d. |
schedules job processing |
ANS:
C
PTS: 1
2. Which
of the following is considered an unintentional threat to the integrity of the
operating system?
a. |
a hacker gaining access to the system
because of a security flaw |
b. |
a hardware flaw that causes the system
to crash |
c. |
a virus that formats the hard drive |
d. |
the systems programmer accessing
individual user files |
ANS:
B
PTS: 1
3. A
software program that replicates itself in areas of idle memory until the
system fails is called a
a. |
Trojan horse |
b. |
worm |
c. |
logic bomb |
d. |
none of the above |
ANS:
B
PTS: 1
4. A
software program that allows access to a system without going through the
normal logon procedures is called a
a. |
logic bomb |
b. |
Trojan horse |
c. |
worm |
d. |
back door |
ANS:
D
PTS: 1
5. All
of the following will reduce the exposure to computer viruses except
a. |
install antivirus software |
b. |
install factory-sealed application
software |
c. |
assign and control user passwords |
d. |
install public-domain software from
reputable bulletin boards |
ANS:
D
PTS: 1
6. Hackers
can disguise their message packets to look as if they came from an authorized
user and gain access to the host’s network using a technique called
a. |
spoofing. |
b. |
spooling. |
c. |
dual-homed. |
d. |
screening. |
ANS:
A
PTS: 1
7. Passwords
are secret codes that users enter to gain access to systems. Security can be
compromised by all of the following except
a. |
failure to change passwords on a
regular basis |
b. |
using obscure passwords unknown to
others |
c. |
recording passwords in obvious places |
d. |
selecting passwords that can be easily
detected by computer criminals |
ANS:
B
PTS: 1
8. Which
control will not reduce the likelihood of data loss due to a line error?
a. |
echo check |
b. |
encryption |
c. |
vertical parity bit |
d. |
horizontal parity bit |
ANS: B
PTS: 1
9. Which
method will render useless data captured by unauthorized receivers?
a. |
echo check |
b. |
parity bit |
c. |
public key encryption |
d. |
message sequencing |
ANS:
C
PTS: 1
10.
Which method is most likely to detect unauthorized access to the
system?
a. |
message transaction log |
b. |
data encryption standard |
c. |
vertical parity check |
d. |
request-response technique |
ANS:
A
PTS: 1
11.
All of the following techniques are used to validate electronic
data interchange transactions except
a. |
value added networks can compare
passwords to a valid customer file before message transmission |
b. |
prior to converting the message, the
translation software of the receiving company can compare the password
against a validation file in the firm’s database |
c. |
the recipient’s application software
can validate the password prior to processing |
d. |
the recipient’s application software
can validate the password after the transaction has been processed |
ANS:
D
PTS: 1
12.
All of the following tests of controls will provide evidence
that adequate computer virus control techniques are in place and functioning
except
a. |
verifying that only authorized software
is used on company computers |
b. |
reviewing system maintenance records |
c. |
confirming that antivirus software is
in use |
d. |
examining the password policy including
a review of the authority table |
ANS:
B
PTS: 1
13.
Audit objectives for communications controls include all of the
following except
a. |
detection and correction of message
loss due to equipment failure |
b. |
prevention and detection of illegal
access to communication channels |
c. |
procedures that render intercepted
messages useless |
d. |
all of the above |
ANS:
D
PTS: 1
14.
When auditors examine and test the call-back feature, they are
testing which audit objective?
a. |
incompatible functions have been
segregated |
b. |
application programs are protected from
unauthorized access |
c. |
physical security measures are adequate
to protect the organization from natural disaster |
d. |
illegal access to the system is
prevented and detected |
ANS:
D
PTS: 1
15.
In an electronic data interchange (EDI) environment, when the
auditor compares the terms of the trading partner agreement against the access
privileges stated in the database authority table, the auditor is testing which
audit objective?
a. |
all EDI transactions are authorized |
b. |
unauthorized trading partners cannot
gain access to database records |
c. |
authorized trading partners have access
only to approved data |
d. |
a complete audit trail is maintained |
ANS:
C
PTS: 1
16.
In determining whether a system is adequately protected from
attacks by computer viruses, all of the following policies are relevant except
a. |
the policy on the purchase of software
only from reputable vendors |
b. |
the policy that all software upgrades
are checked for viruses before they are implemented |
c. |
the policy that current versions of
antivirus software should be available to all users |
d. |
the policy that permits users to take
files home to work on them |
ANS:
D
PTS: 1
17.
In an electronic data interchange environment, customers
routinely
a. |
access the vendor’s accounts receivable
file with read/write authority |
b. |
access the vendor’s price list file
with read/write authority |
c. |
access the vendor’s inventory file with
read-only authority |
d. |
access the vendor’s open purchase order
file with read-only authority |
ANS:
C
PTS: 1
18.
In an electronic data interchange environment, the audit trail
a. |
is a printout of all incoming and
outgoing transactions |
b. |
is an electronic log of all
transactions received, translated, and processed by the system |
c. |
is a computer resource authority table |
d. |
consists of pointers and indexes within
the database |
ANS:
B
PTS: 1
19.
All of the following are designed to control exposures from
subversive threats except
a. |
firewalls |
b. |
one-time passwords |
c. |
field interrogation |
d. |
data encryption |
ANS:
C
PTS: 1
20.
Many techniques exist to reduce the likelihood and effects of
data communication hardware failure. One of these is
a. |
hardware access procedures |
b. |
antivirus software |
c. |
parity checks |
d. |
data encryption |
ANS:
C
PTS: 1
21.
Which of the following deal with transaction legitimacy?
a. |
transaction authorization and
validation |
b. |
access controls |
c. |
EDI audit trail |
d. |
all of the above |
ANS:
D
PTS: 1
22.
Firewalls are
a. |
special materials used to insulate
computer facilities |
b. |
a system that enforces access control
between two networks |
c. |
special software used to screen
Internet access |
d. |
none of the above |
ANS:
B
PTS: 1
23.
Which of the following is true?
a. |
Deep Packet Inspection uses a variety
of analytical and statistical techniques to evaluate the contents of message
packets. |
b. |
An Intrusion prevention system works in
parallel with a firewall at the perimeter of the network to act as a filer
that removes malicious packets from the flow before they can affect servers
and networks. |
c. |
A distributed denial of service attack
is so named because it is capable of attacking many victims simultaneously
who are distributed across the internet. |
d. |
None of the above are true statements. |
ANS: A
PTS: 1
24.
A system of computers that connects the internal users of an
organization that is distributed over a wide geographic area is a(n)
a. |
LAN |
b. |
decentralized network |
c. |
multidrop network |
d. |
Intranet |
ANS: D
PTS: 1
25.
Network protocols fulfill all of the following objectives except
a. |
facilitate physical connection between
network devices |
b. |
provide a basis for error checking and
measuring network performance |
c. |
promote compatibility among network
devices |
d. |
result in inflexible standards |
ANS:
D
PTS: 1
26.
To physically connect a workstation to a LAN requires a
a. |
file server |
b. |
network interface card |
c. |
multiplexer |
d. |
bridge |
ANS: B
PTS: 1
27.
Packet switching
a. |
combines the messages of multiple users
into one packet for transmission. At the receiving end, the packet is
disassembled into the individual messages and distributed to the intended
users. |
b. |
is a method for partitioning a database
into packets for easy access where no identifiable primary user exists in the
organization. |
c. |
is used to establish temporary
connections between network devices for the duration of a communication
session. |
d. |
is a denial of service technique that
disassembles various incoming messages to targeted users into small packages
and then reassembles them in random order to create a useless garbled
message. |
ANS:
C
PTS: 1
28.
A virtual private network:
a. |
is a password-controlled network
for private users rather than the general public. |
b. |
is a private network within a
public network. |
c. |
is an Internet facility that
links user sites locally and around the world. |
d. |
defines the path to a facility or
file on the web. |
e. |
none of the above is true. |
ANS:
B
PTS: 1
29.
A ping signal is used to initiate
a. |
URL masquerading |
b. |
digital signature forging |
c. |
Internet protocol spoofing |
d. |
a smurf attack |
e. |
none of the above is true |
ANS:
D
PTS: 1
30.
In a star topology, when the central site fails
a. |
individual workstations can communicate
with each other |
b. |
individual workstations can function
locally but cannot communicate with other workstations |
c. |
individual workstations cannot function
locally and cannot communicate with other workstations |
d. |
the functions of the central site are
taken over by a designated workstation |
ANS: B
PTS: 1
31.
Which of the following statements is correct? The client-server
model
a. |
is best suited to the token-ring
topology because the random-access method used by this model detects data
collisions. |
b. |
distributes both data and processing
tasks to the server’s node. |
c. |
is most effective used with a bus
topology. |
d. |
is more efficient than the bus or ring
topologies. |
ANS:
B
PTS: 1
32.
A star topology is appropriate
a. |
for a wide area network with a mainframe
for a central computer |
b. |
for centralized databases only |
c. |
for environments where network nodes
routinely communicate with each other |
d. |
when the central database does not have
to be concurrent with the nodes |
ANS:
A
PTS: 1
33.
In a ring topology
a. |
the network consists of a central
computer which manages all communications between nodes |
b. |
has a host computer connected to
several levels of subordinate computers |
c. |
all nodes are of equal status; responsibility
for managing communications is distributed among the nodes |
d. |
information processing units rarely
communicate with each other |
ANS:
C
PTS: 1
34.
A distributed denial of service (DDoS) attack
a. |
is more intensive that a Dos attack
because it emanates from single source |
b. |
may take the form of either a SYN flood
or smurf attack |
c. |
is so named because it effects many
victims simultaneously, which are distributed across the internet |
d. |
turns the target victim’s computers
into zombies that are unable to access the Internet |
ANS:
B
PTS: 1
35.
Which of the following statements is correct? TCP/IP
a. |
is the basic protocol that permits
communication between Internet sites. |
b. |
controls Web browsers that access the
WWW. |
c. |
is the file format used to produce Web
pages. |
d. |
is a low-level encryption scheme used
to secure transmissions in HTTP format. |
ANS:
A
PTS: 1
36.
FTP
a. |
is the document format used to produce
Web pages. |
b. |
controls Web browsers that access the
Web. |
c. |
is used to connect to Usenet groups on
the Internet |
d. |
is used to transfer text files,
programs, spreadsheets, and databases across the Internet. |
e. |
is a low-level encryption scheme used
to secure transmissions in higher-level () format. |
ANS:
D
PTS: 1
37.
IP spoofing
a. |
combines the messages of multiple users
into a “spoofing packet” where the IP addresses are interchanged and the
messages are then distributes randomly among the targeted users. |
b. |
is a form of masquerading to gain
unauthorized access to a web server. |
c. |
is used to establish temporary
connections between network devices with different IP addresses for the
duration of a communication session. |
d. |
is a temporary phenomenon that disrupts
transaction processing. It will resolve itself when the primary computer
completes processing its transaction and releases the IP address needed by
other users. |
ANS:
B
PTS: 1
38.
HTML
a. |
is the document format used to produce
Web pages. |
b. |
controls Web browsers that access the
Web. |
c. |
is used to connect to Usenet groups on
the Internet. |
d. |
is used to transfer text files,
programs, spreadsheets, and databases across the Internet. |
e. |
is a low-level encryption scheme used
to secure transmissions in higher-level () format. |
ANS:
A
PTS: 1
39.
A message that is made to look as though it is coming from a
trusted source but is not is called
a. |
a denial of service attack |
b. |
digital signature forging |
c. |
Internet protocol spoofing |
d. |
URL masquerading |
ANS:
C
PTS: 1
40.
An IP Address:
a. |
defines the path to a facility or file
on the web. |
b. |
is the unique address that every
computer node and host attached to the Internet must have. |
c. |
is represented by a 64-bit data packet. |
d. |
is the address of the protocol rules
and standards that governing the design of internet hardware and software. |
ANS:
B
PTS: 1
41.
A digital signature is
a. |
the encrypted mathematical value of the
message sender’s name |
b. |
derived from the digest of a document
that has been encrypted with the sender’s private key |
c. |
the computed digest of the sender’s
digital certificate |
d. |
allows digital messages to be sent over
analog telephone lines |
ANS:
B
PTS: 1
42.
HTTP
a. |
is the document format used to produce
Web pages. |
b. |
controls Web browsers that access the
Web. |
c. |
is used to connect to Usenet groups on
the Internet |
d. |
is used to transfer text files,
programs, spreadsheets, and databases across the Internet. |
e. |
is a low-level encryption scheme used
to secure transmissions in higher-level () format. |
ANS: B
PTS: 1
43.
Which of the following statements is correct?
a. |
Packet switching combines the messages
of multiple users into a “packet” for transmission. At the receiving end, the
packet is disassembled into the individual messages and distributed to the
intended users. |
b. |
The decision to partition a database
assumes that no identifiable primary user exists in the organization. |
c. |
Packet switching is used to establish
temporary connections between network devices for the duration of a communication
session. |
d. |
A deadlock is a temporary phenomenon
that disrupts transaction processing. It will resolve itself when the primary
computer completes processing its transaction and releases the data needed by
other users. |
ANS:
C
PTS: 1
SHORT ANSWER
1. What
is a virus?
ANS:
A virus is a program that attaches itself to another legitimate
program in order to penetrate the operating system.
PTS: 1
2. List
three methods of controlling unauthorized access to telecommunication messages.
ANS:
call-back devices, data encryption, message sequence numbering,
message authentication codes, message transaction logs, and request-response
technique
PTS: 1
3. What
are some typical problems with passwords?
ANS:
users failing to remember passwords; failure to change passwords
frequently; displaying passwords where others can see them; using simple,
easy-to-guess passwords
PTS: 1
4. Discuss
the key features of the one-time password technique:
ANS:
The one-time password was designed to overcome the problems
associated with reusable passwords.
The user’s password changes continuously.
This technology employs a credit card-sized smart card that
contains a microprocessor programmed with an algorithm that generates, and
electronically displays, a new and unique password every 60 seconds.
The card works in conjunction with special authentication
software located on a mainframe or network server computer. Each user’s card is
synchronized to the authentication software, so that at any point in time both
the smart card and the network software are generating the same password for
the same user.
PTS: 1
5. What
is event monitoring?
ANS:
Event monitoring summarizes key activities related to system
resources. Event logs typically record the IDs of all users accessing the
system; the time and duration of a user’s session; programs that were executed
during a session; and the files, databases, printers, and other resources
accessed.
PTS: 1
6. What
are the auditor’s concerns in testing EDI controls?
ANS:
When testing EDI controls, the auditor’s primary concerns are
related to ascertaining that EDI transactions are authorized, validated, and in
compliance with organization policy, that no unauthorized organizations gain
access to records, that authorized trading partners have access only to
approved data, and that adequate controls are in place to maintain a complete
audit trail.
PTS: 1
7.
What can be done to defeat a DDoS Attack?
ANS:
Intrusion Prevention Systems (IPS) that employ deep packet
inspection (DPI) are a countermeasure to DDoS attacks.
PTS: 1
8. What
is deep packet inspection?
ANS:
DPI is a technique that searches individual network packets for
protocol non-compliance and can identify and classify malicious packets based
on a database of known attack signatures.
PTS: 1
9. Explain
how smurf attacks can be controlled.
ANS:
The targeted organization can program their firewall to ignore
all communication from the attacking site, once the attackers IP address is
determined.
PTS: 1
10.
Explain how SYN Flood attacks can be controlled.
ANS:
Two things can be done:
First, Internet hosts can program their firewalls to block
outbound message packets that contain invalid internal IP addresses.
Second, security software can scan for half-open connections
that have not been followed by an ACK packet. The clogged ports can then be
restored to allow legitimate connections to use them.
PTS: 1
11.
Discuss the private key encryption technique and its
shortcomings.
ANS:
To encode a message, the sender provides the encryption
algorithm with the key, which produces the ciphertext message. This is
transmitted to the receiver’s location, where it is decoded using the same key to
produce a cleartext message. Because the same key is used for coding and
decoding, control over the key becomes an important security issue. The more
individuals that need to exchange encrypted data, the greater the chance that
the key will become known to an intruder who could intercept a message and read
it, change it, delay it, or destroy it.
PTS: 1
12.
Discuss the public key encryption technique.
ANS:
This approach uses two different keys: one for encoding messages
and the other for decoding them. The recipient has a private key used for
decoding that is kept secret. The encoding key is public and published for
everyone to use. Receivers never need to share private keys with senders, which
reduces the likelihood that they fall into the hands of an intruder. One of the
most trusted public key encryption methods is Rivest-Shamir-Adleman (RSA). This
method is, however, computationally intensive and much slower than private key
encryption.
PTS: 1
ESSAY
1. What
is an operating system? What does it do? What are operating system control
objectives?
ANS:
An operating system is a computer’s control program. It controls
user sharing of applications and resources such as processors, memory,
databases, and peripherals such as printers. Common PC operating systems
include Windows 2000, Windows NT, and Linux.
An operating system carries out three primary functions:
translating high level languages into machine language using modules called
compilers and interpreters; allocating computer resources to users, workgroups,
and applications; and managing job scheduling and multiprogramming.
Operating systems have five basic control objectives:
1. to
protect itself from users,
2. to
protect users from each other,
3. to
protect users from themselves,
4. to
protect it from itself, and
5. to
protect itself from its environment.
PTS: 1
2. What
are the three security objectives of audit trails? Explain.
ANS:
Audit trails support system security objectives in three ways.
By detecting
unauthorized access to the system, the audit trail protects
the system from outsiders trying to breach system controls. By monitoring
system performance, changes in the system may be detected. The audit trail can
also contribute to reconstructing
events such as system failures, security breaches, and
processing errors. In addition, the ability to monitor user activity can
support increased personal
accountability.
PTS: 1
3. Discuss
three sources of exposure (threats) to the operating system.
ANS:
1. Privileged
personnel who abuse their authority. Systems administrators and systems
programmers require unlimited access to the operating system to perform
maintenance and to recover from system failures. Such individuals may use this
authority to access users’ programs and data files.
2. Individuals
both internal and external to the organization who browse the operating system
to identify and exploit security flaws.
3. Individuals
who intentionally (or accidentally) insert computer viruses or other forms of
destructive programs into the operating system.
PTS: 1
4. Discuss
three techniques for breaching operating system controls.
ANS:
Browsing involves searching through areas of main memory for
password information.
Masquerading is a technique where a user is made to believe that
he/she has accessed the operating system and therefore enters passwords, etc.,
that can later be used for unauthorized access.
A virus is a program that attaches itself to legitimate software
to penetrate the operating system. Most are destructive.
A worm is software that replicates itself in memory.
A logic bomb is a destructive program triggered by some
“logical” condition–a matching date, e.g., Michelangelo’s birthday.
PTS: 1
5. A
formal log-on procedure is the operating system’s first line of defense.
Explain how this works.
ANS:
When the user logs on, he or she is presented with a dialog box
requesting the user’s ID and password. The system compares the ID and password
to a database of valid users. If the system finds a match, then the log-on
attempt is authenticated. If, however, the password or ID is entered
incorrectly, the log-on attempt fails and a message is returned to the user.
The message should not reveal whether the password or the ID caused the
failure. The system should allow the user to reenter the log-on information.
After a specified number of attempts (usually no more than five), the system
should lock out the user from the system.
Comments
Post a Comment