M4 and M5

M4 and M5

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Rohit Narang

FREE Resource

Student preview

quiz-placeholder

49 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company that relies heavily on one specific operating system which is used in the employee workstations and is embedded within devices that support the automated production line software. It is discovered the operating system has a vulnerability that could allow an attacker to force applications to not release memory segments after execution. Which of the following best describes the type of threat this vulnerability introduces?
Injection attacks
Memory corruption
Denial of service
Software locking

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An IS auditor is auditing a proposed software acquisition. What should be kept in mind?
operating system in use is compatible with various hardware platforms
OS updates are scheduled before software to be acquired is implemented
OS has the latest versions and updates
the software system should be compatible with the current or planned OS

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An IS auditor reviewing the operating system integrity of a server would PRIMARILY:
verify that user programs do not invoke privileged programs and services
determine whether administrator accounts have proper password controls
ensure that file permissions are correct on configuration files
verify that programs or services running on the server are from valid sources

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An organization which has large number of suppliers wants to have an online update of the material supply. Therefore, it wishes to provide limited network access to its suppliers. Which of these options would be chosen?
Extranet
Dedicated line
Internet
Intranet

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

At which layer of the OSI model does a gateway operate?
Networking
Session
Presentation
Application

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Due to increased level of attacks on an organization’s Internet, it has asked its audit team to recommend a detection and deterrent control against Internet attacks. Which of the below would be the BEST option?
Honeypots
CCTV
VPN
VLAN

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During an audit where scope includes server environments, an IS auditor would be ensured with which of the below BEST providing the highest degree of server access control?
A mantrap-monitored entryway to the server room
Host-based intrusion detection combined with CCTV
Network-based intrusion detection
A fingerprint scanner facilitating biometric access control

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?