Aud3 Chap3 Sample Quiz
Aud3 Chap3 Sample Quiz
Networks
TRUE/FALSE
1. In a computerized environment, the audit trail log must be printed onto paper documents.
ANS: F PTS: 1
2. Disguising message packets to look as if they came from another user and to gain access to the host’s
network is called spooling.
ANS: F PTS: 1
3. A formal log-on procedure is the operating system’s last line of defense against unauthorized access.
ANS: F PTS: 1
4. Computer viruses usually spread throughout the system before being detected.
ANS: T PTS: 1
ANS: T PTS: 1
ANS: F PTS: 1
ANS: F PTS: 1
microcomputers.
ANS: T PTS: 1
ANS: T PTS: 1
ANS: T PTS: 1
ANS: T PTS: 1
ANS: T PTS: 1
network.
ANS: F PTS: 1
ANS: T PTS: 1
ANS: T PTS: 1
ANS: F PTS: 1
transactions.
ANS: T PTS: 1
ANS: T PTS: 1
ANS: T PTS: 1
ANS: T PTS: 1
ANS: T PTS: 1
23. Because of network protocols, users of networks
ANS: T PTS: 1
ANS: F PTS: 1
to do it.
ANS: F PTS: 1
ANS: T PTS: 1
ANS: T PTS: 1
ANS: F PTS: 1
ANS: F PTS: 1
ANS: T PTS: 1
collisions.
ANS: T PTS: 1
encrypted data, the greater the chance that the key will
ANS: F PTS: 1
ANS: T PTS: 1
applications.
ANS: F PTS: 1
MULTIPLE CHOICE
except
ANS: C PTS: 1
ANS: B PTS: 1
a. Trojan horse
b. worm
c. logic bomb
ANS: B PTS: 1
called a
a. logic bomb
b. Trojan horse
c. worm
d. back door
ANS: D PTS: 1
viruses except
ANS: D PTS: 1
a. spoofing.
b. spooling.
c. dual-homed.
d. screening.
ANS: A PTS: 1
ANS: B PTS: 1
a. echo check
b. encryption
unauthorized receivers?
a. echo check
b. parity bit
d. message sequencing
ANS: C PTS: 1
d. request-response technique
ANS: A PTS: 1
c. the recipient’s application software can validate the password prior to proce
d. the recipient’s application software can validate the password after the trans
ANS: D PTS: 1
ANS: B PTS: 1
ANS: D PTS: 1
ANS: D PTS: 1
audit objective?
ANS: C PTS: 1
b. the policy that all software upgrades are checked for viruses before they
c. the policy that current versions of antivirus software should be available to all us
d. the policy that permits users to take files home to work on them
ANS: D PTS: 1
customers routinely
d. access the vendor’s open purchase order file with read-only authorit
ANS: C PTS: 1
audit trail
ANS: B PTS: 1
19. All of the following are designed to control exposures
a. firewalls
b. one-time passwords
c. field interrogation
d. data encryption
ANS: C PTS: 1
these is
b. antivirus software
c. parity checks
d. data encryption
ANS: C PTS: 1
legitimacy?
b. access controls
ANS: D PTS: 1
ANS: B PTS: 1
a.
message packets.
filer that removes malicious packets from the flow before they can af
c.
ANS: A PTS: 1
a. LAN
b. decentralized network
c. multidrop network
d. Intranet
ANS: D PTS: 1
objectives except
ANS: D PTS: 1
requires a
a. file server
c. multiplexer
d. bridge
ANS: B PTS: 1
a.
combines the messages of multiple users into one packet for transmi
c.
session.
ANS: C PTS: 1
a. is a password-controlled network for private users rather than the general public.
c. is an Internet facility that links user sites locally and around the w
a. URL masquerading
d. a smurf attack
ANS: D PTS: 1
d. the functions of the central site are taken over by a designated works
ANS: B PTS: 1
client-server model
a.
data collisions.
ANS: B PTS: 1
c. for environments where network nodes routinely communicate with each other
d. when the central database does not have to be concurrent with the node
ANS: A PTS: 1
ANS: C PTS: 1
d. turns the target victim’s computers into zombies that are unable to acces
ANS: B PTS: 1
ANS: A PTS: 1
36. FTP
ANS: D PTS: 1
37. IP spoofing
a.
and the messages are then distributes randomly among the targeted us
c.
ANS: B PTS: 1
38. HTML
ANS: A PTS: 1
ANS: C PTS: 1
40. An IP Address:
b. is the unique address that every computer node and host attached to the I
d. is the address of the protocol rules and standards that governing the des
software.
ANS: B PTS: 1
b. derived from the digest of a document that has been encrypted with
ANS: B PTS: 1
42. HTTP
ANS: B PTS: 1
a.
users.
c.
communication session.
ANS: C PTS: 1
SHORT ANSWER
1. What is a virus?
ANS:
PTS: 1
telecommunication messages.
ANS:
PTS: 1
ANS:
technique:
ANS:
software, so that at any point in time both the smart card and
PTS: 1
ANS:
ANS:
audit trail.
PTS: 1
ANS:
PTS: 1
ANS:
signatures.
PTS: 1
ANS:
PTS: 1
ANS:
addresses.
use them.
PTS: 1
shortcomings.
ANS:
data, the greater the chance that the key will become known
PTS: 1
ANS:
messages and the other for decoding them. The recipient has a
which reduces the likelihood that they fall into the hands of an
PTS: 1
ESSAY
ANS:
PTS: 1
Explain.
ANS:
accountability.
PTS: 1
operating system.
ANS:
security flaws.
PTS: 1
controls.
ANS:
password information.
access.
birthday.
PTS: 1
5. A formal log-on procedure is the operating system’s first
ANS:
When the user logs on, he or she is presented with a dialog box