You are on page 1of 2

Chapter 3- Security Part 1: Auditing Operating Systems and Networks

1. It is the computer’s control program. It allows users and their applications to share and access common
computer resources, such as processors, main memory, databases, and printers.
a. Operating System
b. Auditing System
c. Security System
d. None of the above

2. The following are the objectives of Operating System, except.


a. Protect itself against tampering by users.
b. Safeguard users’ application modules from destroying or corrupting other modules.
c. Protect users from accessing, destroying, or corrupting another user’s programs or data.
d. Protect you from environment including power failures and other disasters.

3. It is a type of DOS Attack that uses numerous intermediary computers to flood the target computer with
test messages, “pings” causing network congestion.
a. SYN Flood Attack
b. Smurf Attack
c. Heart Attack
d. Distributed Denial of Service Attack

4. An assault on a Web server to prevent it from servicing users.


a. IP spoofing
b. Smurf
c. Denial of service (DOS) attack
d. Distributed Denial of Service Attack

5. It is a secret code user enters to gain access to system or data.


a. Password
b. Secret code
c. Pin code
d. 123 code

6. Rules and standards governing design of hardware and software that permit network users to
communicate and share data
a. Protocols
b. Internet Address
c. Intranet Technologies
d. Internet Technologies

7. It is the intercompany exchange of computer-processible business information in standard format


a. Internet Risks
b. Operating System Control
c. Auditing Electronic Data Interchange
d. Encryption

8. The following are benefits of EDI or Electronic Data Interchange, except:


a. Data Keying
b. Error Reduction
c. Automated Procedures
d. Cost Reduction

9. It is a program that attaches itself to a legitimate program to penetrate the operating system and
destroy programs, files and operating system itself.
a. Worm
b. Virus
c. Trojan Horse
d. Logic Bomb

10. What was originally developed for the US Military and later became used widely for academic and
government research
a. Intranet
b. World Wide Web
c. Internet
d. Extranets

You might also like