Correct Answer
verified
Multiple Choice
A) Internet
B) LAN
C) Virtual private network (VPN)
D) Decentralized network
Correct Answer
verified
Essay
Correct Answer
verified
Multiple Choice
A) It is a way to use the public telecommunication infrastructure in providing secures access to an organization's network.
B) It enables the employees to work remotely by accessing their firm's network securely using the Internet
C) The packets sent through VPN are encrypted and with authentication technology.
D) The expensive cost is one major disadvantage of VPN.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) The attacker impersonates an authorized user and gains certain unauthorized privileges to the wireless network
B) The attacker passively monitors wireless networks for data, including authentication credentials
C) The attacker steals or makes unauthorized use of a service
D) The attacker actively intercepts communications between wireless clients and access points to obtain authentication credentials and data.
Correct Answer
verified
Multiple Choice
A) Continuous audit is to perform audit-related activities on a continuous basis
B) Testing in continuous audits often consists of continuous controls monitoring and continuous data assurance
C) Technology plays a key role in continuous audit in analyzing trends and patterns of transactions, identifying exceptions and anomalies, and testing controls
D) Continuous audit is frequently used to perform substantive tests and is used for testing of controls through transactional-data analysis
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Guard against spoofing
B) Filtering packets
C) Deny computer hackers access to sensitive data
D) All of the above
Correct Answer
verified
Multiple Choice
A) The attacker actively intercepts communications between wireless clients and access points to obtain authentication credentials and data
B) The attacker alters a legitimate message sent via wireless networks by deleting, adding to, changing, or reordering it
C) The attacker passively monitors wireless networks for data, including authentication credentials
D) The attacker impersonates an authorized user and gains certain unauthorized privileges to the wireless network
Correct Answer
verified
Multiple Choice
A) Embedded audit modules cannot be protected from computer viruses.
B) Auditors are required to monitor embedded audit modules continuously to obtain valid results.
C) Embedded audit modules can easily be modified through management tampering.
D) Auditors are required to be involved in the system design of the application to be monitored.
Correct Answer
verified
Multiple Choice
A) The IP address of a desktop computer often changes
B) The MAC address of a desktop computer often changes
C) The IP address of a Web server does not change
D) Each hardware device must have a MAC address
Correct Answer
verified
Multiple Choice
A) Recreate the test, using different software.
B) List a sample of actual data to verify the accuracy of the test program.
C) Ignore the discrepancy because the grand totals reconcile and instruct the controller to correct program.
D) Create test transactions and run test data on both the production and simulation program.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Provide the communication within the network
B) Select network pathways within a network for the flow of data packets.
C) Amplify and rebroadcast signals in a network
D) Forward data packets to their internal network destination
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 20 of 48
Related Exams