1. Using the OSI reference model, what layer(s) is/are used to encrypt data?
A) transport layer B) Session layer C) Session and transport layers D) Data link layer
2. When should systems administrators first assess the impact of applications or systems patches?
A) Within five business days following installation B) Prior to installation C) No sooner than five business days following installation D) Immediately following installation
3. Which of the following is the most fundamental step in preventing virus attacks?
A) Adopting and communicating a comprehensive antivirus policy B) Implementing antivirus protection software on users' desktop computers C) Implementing antivirus content checking at all network-to-Internet gateways D) Inoculating systems with antivirus code
4. Which of the following is of greatest concern when performing an IS audit?
A) Users' ability to directly modify the database B) Users' ability to submit queries to the database C) Users' ability to indirectly modify the database D) Users' ability to directly view the database
5. What are intrusion-detection systems (IDS) primarily used for?
A) To identify AND prevent intrusion attempts to a network B) To prevent intrusion attempts to a network C) Forensic incident response D) To identify intrusion attempts to a network
1. Right Answer: C Explanation: User applications often encrypt and encapsulate data using protocols within the OSI session layer or farther down in the transport layer.
2. Right Answer: B Explanation: Systems administrators should always assess the impact of patches before installation.
3. Right Answer: A Explanation: Adopting and communicating a comprehensive antivirus policy is the most fundamental step in preventing virus attacks. All other antivirus prevention efforts rely upon decisions established and communicated via policy.
4. Right Answer: A Explanation: A major IS audit concern is users' ability to directly modify the database.
5. Right Answer: D Explanation: Intrusion-detection systems (IDS) are used to identify intrusion attempts on a network.
Leave a comment