Professional Documents
Culture Documents
IT22 CH16 Quiz Key Answers
IT22 CH16 Quiz Key Answers
IT22 CH16 Quiz Key Answers
I. Identification
__________ 1. Is the computer’s control program which allows users and their applications to
share and access computer resources, such as processors, main memory, databases, and
printers.
__________ 2. Is the operating system’s first line of defense against unauthorized access.
__________ 4. Requires the dial-in user to enter a password and be identified. The system then
breaks the connection to perform user authentication.
__________ 5. A data transmission error that occurs when several consecutive bits are mistakenly
flipped, resulting in a series of successive incorrect values.
Key Answers:
1. operating system
2. log-on procedure
4. call-back devices
5. burst error
__________ 2. Computer viruses usually spread throughout the system before being detected.
__________ 3. A recovery module suspends all data processing while the system reconciles its
journal files against the database.
Key Answers:
1. True
2. True
3. False
4. False
5. False
3. A software program that allows access to a system without going through the normal
logon procedures is called a
a. logic bomb
b. Trojan horse
c. worm
d. back door
4. All of the following will reduce the exposure to computer viruses except
6. Passwords are secret codes that users enter to gain access to systems. Security can be
compromised by all of the following except:
a. failure to change passwords on a regular basis
d. request-response technique
9. Audit objectives for the database management include all of the following except
a. verifying that the security group monitors and reports on fault tolerance violations
c. ensuring that authorized users access only those files they need to perform their duties
10. When auditors examine and test the call-back feature, they are testing which audit
objective?
c. physical security measures are adequate to protect the organization from natural
disaster
a. biometric controls
b. encryption controls
c. backup controls
d. inference controls
12. All of the following are designed to control exposures from subversive threats except
a. Firewalls
b. one-time passwords
c. field interrogation
d. data encryption
13. Many techniques exist to reduce the likelihood and effects of data communication
hardware failure. One of these is
b. antivirus software
c. parity checks
d. data encryption
b. access controls
16. Are logs that record activity at the system, application, and user level.
c. event-oriented logs
d. keystroke monitoring
18. It uses the logs and backup files to restart the system after a failure.
a. recovery modules
b. checkpoint feature
c. transaction log
d. database backup
a. digital certificate
d. digital signatures