Information Technology Auditing 4th Edition James A Hall- Test Bank

Page 1

Information Technology Auditing 4th Edition James A Hall- Test Bank To purchase this Test Bank with answers, click the link below

https://examquizes.com/product/information-technology-auditing-4th-edition-james-a-hall-test-bank/

Description Information Technology Auditing 4th Edition James A Hall- Test Bank Sample Questions Instant Download With Answers Chapter 3—Security Part I: Auditing Operating Systems and Networks

TRUE/FALSE

1.

In a computerized environment, the audit trail log must be printed onto paper documents.

ANS: F

2.

Disguising message packets to look as if they came from another user and to gain access to the host’s network is called spooling.

ANS: F

3.

PTS: 1

A formal log-on procedure is the operating system’s last line of defense against unauthorized access.

ANS: F

4.

PTS: 1

PTS: 1

Computer viruses usually spread throughout the system before being detected.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Information Technology Auditing 4th Edition James A Hall- Test Bank by curdarukki - Issuu