{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

See chapter 10 erasure is seldom 100 percent

Info icon This preview shows pages 4–7. Sign up to view the full content.

View Full Document Right Arrow Icon
See Chapter 10. Erasure is seldom 100-percent effective. Despite complex and time-consuming methods, the slightest traces of data on media that’s been erased may always remain. 163 Software controls are used to A. Perform input checking to ensure that no buffer overflows occur. B. Prevent running programs from viewing or changing other programs’ memory. C. Perform configuration management-like functions on software. D. Ensure the confidentiality and integrity of software. Answer: D See Chapter 10. Software controls are used to protect software from unauthorized disclosure or tampering. 164 Someone who's performing penetration testing is See Chapter 10. Penetration testing is used to mimic an intruder’s activities by identifying potential weaknesses in hardware or software. 165 Which of the following is NOT a purpose for audit trails?
Image of page 4

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
See Chapter 10. Audit trails tell what happened and who did what, but they don’t say why. 166 The primary reason for using an external auditor versus an internal auditor is See Chapter 10. The main benefit from external auditors is their objectivity. A conflict of interest is less likely to exist when external auditors examine a system. 167 Password cracking, port scanning, and network sniffing are known as A. Covert channels B. Threats C. Vulnerabilities D. Weaknesses Answer: B See Chapter 10. These activities are threats. Threats describe any event that can damage or disclose information. 168 Software bugs, configuration errors, and the absence of security processes are known as A. Covert channels B. Threats C. Vulnerabilities D. Inverse channels Answer: C See Chapter 10. Vulnerabilities, also known as weaknesses, are the characteristics of information systems that can be exploited by threats. 169 A port scanning tool is used to
Image of page 5
Image of page 6

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern