1. What can be very helpful to an IS auditor when determining the efficacy of a systems maintenance program?
A) Network-monitoring software B) A system downtime log C) Administration activity reports D) Help-desk utilization trend reports
2. What are used as a countermeasure for potential database corruption when two processes attempt to simultaneously edit or update the same information?
A) Referential integrity controls B) Normalization controls C) Concurrency controls D) Run-to-run totals
3. What increases encryption overhead and cost the most?
A) A long symmetric encryption key B) A long asymmetric encryption key C) A long Advance Encryption Standard (AES) key D) A long Data Encryption Standard (DES) key
4. Which of the following best characterizes 'worms'?
A) Malicious programs that can run independently and can propagate without the aid of a carrier program such as email. B) Programming code errors that cause a program to repeatedly dump data C) Malicious programs that require the aid of a carrier program such as email D) Malicious programs that masquerade as common applications such as screensavers or macro- enabled Word documents
5. What is an initial step in creating a proper firewall policy?
A) Assigning access to users according to the principle of least privilege B) Determining appropriate firewall hardware and software C) Identifying network applications such as mail, web, or FTP servers D) Configuring firewall access rules
1. Right Answer: B Explanation: A system downtime log can be very helpful to an IS auditor when determining the efficacy of a systems maintenance program.
2. Right Answer: A Explanation: Concurrency controls are used as a countermeasure for potential database corruption when two processes attempt to simultaneously edit or update the same information.
3. Right Answer: B Explanation: A long asymmetric encryption key (public key encryption) increases encryption overhead and cost. All other answers are single shared symmetric keys.
4. Right Answer: A Explanation: Worms are malicious programs that can run independently and can propagate without the aid of a carrier program such as email.
5. Right Answer: C Explanation: Identifying network applications such as mail, web, or FTP servers to be externally accessed is an initial step in creating a proper firewall policy.
Leave a comment