IT Security & Application Development Flashcards

1
Q

The difficulty of maintaining the integrity of the data is

A

The most significant limitation of computer-based audit tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Limit who can physically enter the data center

A

Physical access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Are designed to protect the organization’s physical information assets.

A

Environmental controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Are needed because of the use of communications networks and connections to external systems.

A

Logical security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Connection to the internet presents security issues. Thus, the organization-wide network security policy should at the very least include:

A

1) A user account management system,
2) Installation of an Internet firewall, and
3) Methods such as encryption to ensure that only the intended user receives the information and that the information is complete and accurate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The responsibility for creating, maintaining, securing, and restricting access to the database belongs to the

A

Database administrator (DBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The five IT business assurance objectives include:

A

1) Availability
2) Capability
3) Functionality
4) Protectability, and
5) Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

May exploit a known hole or weakness in an application or operating system program to evade security measures.

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of server attacks:

A

1) Password attacks
2) Man-in-the-middle attack
3) Denial-of-service (DOS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A brute-force attack uses password-cracking software to try large numbers of letter and number combinations to access a network.

A

Password attacks

Passwords also may be discovered by Trojan horses, IP spoofing, and packet sniffers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Takes advantage of networking, packet sniffing, and routing and transport protocols.

A

Man-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is an attempt to overload a system with false messages so that it cannot function.

A

Denial-of-service (DOS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is needed to respond to security breaches if an organization’s computer system has external connections.

A

Intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Works by using sensors to examine packets traveling on the network.

A

Network IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Internal auditors often assess the organization’s information

A

Integrity and reliability practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is responsible for ensuring that an organization’s privacy framework is in place

A

Management

17
Q

Primary role is to ensure that relevant privacy laws and other regulations are being properly communicated to the responsible parties

A

Internal auditors’

18
Q

Is a means of taking a user’s identity from the operating system on which the user is working and passing it to an authentication server for verification.

A

Application authentication

19
Q

Technology converts data into a code. A program codes data prior to transmission. Another program decodes it after transmission. Unauthorized users still may be able to access the data, they cannot decode the information

A

Encryption

20
Q

Requires two keys, one public and one private. These pairs of keys are issued by a trusted third party called a certificate authority.

A

Public-key (asymmetric) encryption

21
Q

Is a means of authentication of an electronic document, for example, a purchase order, acceptance of a contract, or financial information

A

Digital signature

22
Q

Is another means of authentication used in e-business. The certificate authority issues a coded electronic certificate that contains the holder’s name, a copy of its public key, a serial number, and an expiration date. The certificate verifies the holder’s identity.

A

Digital certificate

23
Q

Is less secure than the public-key method because it requires only a single (secret) key for each pair of parties that want to send each other coded messages.

A

Private-key encryption

24
Q

Involves user-created or user-acquired systems that are maintained and operated outside of traditional information systems controls

A

End-User Computing (EUC)

25
Q

Three basic architectures for desktop computing include:

A

1) Client-server system
2) Dummy terminal model
3) Application server model

26
Q

Divides processing of an application between a client machine on a network and a server. This division depends on which tasks each is best suited to perform.

A

Client-server system

27
Q

In this architecture, desktop machines that lack stand-alone processing power have access to remote computers in a network.

A

Dummy terminal model

28
Q

Involves a three-tiered or distributed network application. Also performs business logic functions, transaction management, and load balancing.

A

Application server model

29
Q

The application server model involves a three-tiered or distributed network application.

A

The middle (application) tier translates data between the database (back-end) server and the user’s (front-end) server.

30
Q

Over the life of an application, users are constantly asking for changes. The process of managing these changes is referred to as _______, and the relevant controls are called ______

A

Systems maintenance & Program change controls

31
Q

The program change control process includes

A

1) Saving a copy of the production program in a test area of the computer.
2) Making the necessary changes to this copy of the program.
3) Transforming the changed program into a form that the computer can execute.
4) Testing the changed program to see if it performs the new task as expected.
5) Demonstrating the new functionality for the user.
6) Moving the program to a holding area once it is in an acceptable form.
7) (The supervisor) Reviewing, approving, and authorizing the new program.

32
Q

Is the traditional methodology applied to the development of large, highly structured application systems. A major advantage of the approach is enhanced management and control of the development process.

A

Systems development life cycle (SDLC)

33
Q

The phases and component steps of the traditional SDLC can be described as:

A

1) Definition
2) Design
3) Development
4) Implementation, and
5) Maintenance

34
Q

Is an alternative approach to application development that involves creating a working model of the system requested, demonstrating it for the user, obtaining feedback, and making changes to the underlying code.

A

Prototyping

35
Q

Common application development tools are:

A

1) Computer-aided software engineering (CASE)
2) Object-oriented programming (OOP)
3) Rapid application development (RAD)

36
Q

Which applies the computer to software design and development

A

Computer-aided software engineering (CASE)

37
Q

Which combines data and the related procedures into an object

A

Object-oriented programming (OOP)

38
Q

Which is a software development process involving iterative development, the construction of prototypes, and the use of CASE tools

A

Rapid application development (RAD)