You are on page 1of 2

Chapter 3 – Auditing Operating System and Network

1. It is a sequence of number used to detect missing messages.


a. Call-back devices c. Request-response technique
b. Message transaction log d. Message sequence numbering

2. It is a control message form the sender and a response from the receiver are sent at
periodic, synchronized intervals.
a. Request-response technique c. Message sequence numbering
b. Call-back devices d. None of the above

3. Among the choices below, which is the main task the operating system performs?
a. Allocates computer resources to users c. Translate low-level languages
b. Manages organizational structure d. None of the above

4. What are the techniques that a virus could use to infect system?
The program can attach itself to:
I. An .EXE and .COM file
II. An .OVL program file
III. The boot sector of the disk
IV. A device driver program

a. I, III and IV only c. I, II, III, IV


b. I only d. none

5. It is a system that enforces access control between two networks.


a. Firewall c. Network
b. Virus d. Program

6. Statement 1: The information in the access token is used to approve all actions attempted
by the user during the session.
Statement 2: In distributed systems, end users may control (own) resources.

a. False ; True c. True ; True


b. False ; False d. True ; False
7. ___________ is the computer equivalent of a telephone wiretap. It is a log that records
both the user’s keystrokes and the system’s responses to them.
a. Access Token c. Event monitoring
b. Keystroke Monitoring d. None of the choices

8. Statement 1: At login, the operating system creates an access token that contains key
about the user, including user ID, password, user group, and privileges granted to the
user.
Statement 2: Most antiviral programs run in the background on the host computer and
automatically test all files that are uploaded to the host.

a. True ; True c. False ; True


b. True ; False d. False ; False

9. A ___________ accepts or denies access requests based on filtering rules, and then
directs the incoming calls to the correct internal receiving node.

a. Network-level firewall c. Application-level Firewall


b. Firewall d. Either a or c

10. ________ is an audit log that summarizes key activities related to users, applications, and
system resources.
a. Vaccine c. Keystroke monitoring
b. Firewall d. Event monitoring

You might also like