trojan horse.

trojan horse.

Question 1

A software program that allows access to a system without going through the normal logon procedures is called back door.

True

False

Question 2

A software program that replicates itself in areas of idle memory until the system fails is called a trojan horse.

True

False

Response Feedback:

It is called a worm.

Question 3

The grandfather-parent-child (aka grandfather-father-son) backup technique is most appropriate for sequential batch systems.

True

False

Question 4

Encryption is the conversion of data into a secret code for storage in databases and transmission over networks. For transmissions, the message is coded at the sending end using an encryption algorithm and is decoded at the receiving end.

True

False

Question 5

Which of the following is not a form of contra password security behavior?

Using a simplistic password.

Failing to change your password on a frequent basis.

Not backing up files are according to policy.

Forgetting your password.

Writing your password down and displaying it so others can see it.

Question 6

In an electronic data interchange environment, customers routinely access the vendor’s price list.

True

False

Question 7

In an electronic data interchange (EDI) environment, when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table, the auditor is testing the audit objective that authorized trading partners have access only to approved data.

True

False

Question 8

Audit objectives in the electronic data interchange (EDI) environment include all of the following except

all EDI transactions are authorized

unauthorized trading partners cannot gain access to database records

a complete audit trail of EDI transactions is maintained

backup procedures are in place and functioning properly

Question 9

In determining whether a system is adequately protected from attacks by computer viruses, all of the following policies are relevant except

the policy on the purchase of software only from reputable vendors

the policy that all vendor software upgrades are checked for viruses before they are implemented

the policy that current versions of antivirus software should be available to all users

the policy that permits users to take files home to work on them

Question 10

Which of the following is not an audit procedure for access privileges?

Review the organization’s policies regarding incompatible functions to insure that they promote reasonable security.

Review employee’s privileges to determine if their access rights are appropriate for their job.

Review data back up procedures to determine if they are adequate.

Review employee personnel records to determine whether privileged employees have a security check in compliance with company policy.