You are on page 1of 4

Test jalan

Heri ayo jawab

1. An audit log can serve as:

a.Corrective control
b.Compensating control
c.Preventive control
d.Detective control

2. The following are the control objectives of an operating system, except:

a.
The operating system must protect users from its environment
b.
The operating system must be protected from itself
c.
The operating system must protect itself from users
d.
3. The operating system must protect users from each other

(1) Unauthorized access

(2) Intentional or unintentional insertion of viruses

(3) loss of data due to system malfunction

The principle threat to the operating system:

a. 1, 2, and 3
B. 1
C. 1 and 2
D. 2 and 3

4. Passwords serve to protect user accounts, however it may actually circumvent the
security purpose. What best action can be taken to minimize this?
a. encourage users to not share their password

b. use one-time passwords


c. encourage users to not write-down their password
d. All answers are correct

5. The following are audit objectives relating to EDI, except:

a.authorized trading partners have access to all client data


b.EDI transactions are authorized, validated, and in compliance with the trading partner
agre LJlement
c.adequate controls are in place to ensure complete audit trail of all EDI
transactioversive threats can be minimized throughns
d.No unauthorized organization gain access to database records

6. Audit log that summarizes key activities related to users, applications, and system
resources:

a. keystroke monitoring
b. event monitoring
c. access monitoring
d. users monitoring

7. Audit trails can be used to support security objectives by way of:

a. All answers are correct

b. Promoting personal accountability


c. Reconstructing events
d. Detecting unauthorized access to the system
8. A program whose purpose is to capture IDs and passwords from unsuspecting users
which is designed to mimic the normal log-on procedures of the operating system

a.
Firewall
b.
Worm
c.
Trojan horse
d.
Virus

9. Subversive threats can be minimized through:

a.
firewalls and data encryption
b.
parity checks and data encryption
c.
echo checks and DPI
d.
echo checks, and parity checks

10. Categorize each of the following as either an equipment failure control or an


unauthorized access control

Message authentication Answer 1


Choose…
equipment failure control
unauthorized access control
line error Answer 2
Choose…
equipment failure control
unauthorized access control
parity check Answer 3
Choose…
equipment failure control
unauthorized access control
data encryption Answer 4
Choose…
equipment failure control unauthorized
access control

You might also like