Information Technology Auditing 4th Edition James A Hall- Test Bank To purchase this Test Bank with answers, click the link below
https://examquizes.com/product/information-technology-auditing-4th-edition-james-a-hall-test-bank/
Description Information Technology Auditing 4th Edition James A Hall- Test Bank Sample Questions Instant Download With Answers Chapter 3—Security Part I: Auditing Operating Systems and Networks
TRUE/FALSE
1.
In a computerized environment, the audit trail log must be printed onto paper documents.
ANS: F
2.
Disguising message packets to look as if they came from another user and to gain access to the host’s network is called spooling.
ANS: F
3.
PTS: 1
A formal log-on procedure is the operating system’s last line of defense against unauthorized access.
ANS: F
4.
PTS: 1
PTS: 1
Computer viruses usually spread throughout the system before being detected.