Chap 3 CIS True or False Uploaded by VanessaManaoat
Books
Audiobooks
Magazines News
Documents
Sheet Music
CIS
Save
Embed
Share
Print
Download
Join
james hall
1
of 1
Information Accounting
CH10Q_GRP.1
Search document
TRUE 1.
2. 3.
4. 5. 6. 7. 8. 9.
10. 11.
12. 13.
14. 15. 16.
17. 18. 19.
20. 21. 22. 23.
24. 25.
Computer viruses usually spread throughout the system before being detected A worm is software program that replicates itself in areas of idle memory until the system fails. The most frequent victims of program viruses are microcomputers Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystro and event-oriented logs. In a telecommunications environment, line errors can be detected by using an echo check. The message authentication code is calculated calculated by the sender and the receiver of a data transmission. The request-response technique should detect if a data communication transmission has been diverted. A value added network can detect and reject transactions by unauthorized trading partners. Electronic data interchange customers may be given access to the vendor's data files. The audit trail for electronic data interchange transactions is stored on magnetic media. To preserve audit trails in a computerized environment, transaction logs are permanent records of transactions. Examining programmer authority tables for information about who has access to Data Definition Language comm will provide evidence about who is responsible for creating subschemas. The network paradox is that networks exist to provide user access to shared resources while one of its most impo objectives is to control access. IP spoofing is a form o f masquerading to gain unauthorized access to a Web server. The rules that make it possible for users of n etworks to communicate are called protocols. A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fea negative publicity Because of network protocols, users of networks built by d ifferent manufacturers are able to communicate and sh data. The bus topology connects the nodes in p arallel. A network topology is the physical arrangement of the components o f the network. A bus topology is less costly to install than a ring topology. In a hierarchical topology, network nodes communicate with each other via a central host computer. Polling is one technique used to control data collisions intermediary in a smurf attack is also a victim A ping is used to test the state of network congestion and determine whether a particular host computer is connec and available on the network. A ping is an Internet maintenance tool that is used to test the state of network congestion and determine whether particular host computer computer
FALSE
1. 2.
In a computerized environment, the audit trail log must be printed onto p aper documents. Disguising message packets to look as if they came from another user and to gain access to the host’s network is spooling. Read Free Foron 30this Days Sign against up to vote title A formal log-on log-on procedure is the operating system’s last line of defense unauthorized access. 3. Not useful 4. Viruses rarely attach themselves to executable files Useful Cancel anytime. 5. Operating system controls are of interest to system professionals but should not concern accountants and auditor Special offer for students: Only $4.99/month. 6. Operating system integrity is not of concern to accountants because only hardware risks are involved. Firewalls are special materials used to insulate computer facilitie 7.
Master your semester with Scribd & The New York Times
Home
Saved
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.