135. Indicate the correct sequence in which primary questions must be addressed when an organization is determined to do a security review for fraud.
1.
How vulnerable is the organization?2.
How can the organization detect fraud?3.
How would someone go about defrauding the organization?4.
What does the organization have that someone would want to defraud?a.
1, 2, 3, and 4b.
3, 4, 2, and 1c.
2, 4, 1, and 3d.
4, 3, 1, and 2135. d.
The question is asking for the correct sequence of activities that should take place when reviewing for fraud. The organization should have something of value to others. Detection of fraud is least important; prevention is most important.136. Which of the following zero-day attack protection mechanisms is
not suitable to computing environments with a large number of users?a.
Port knockingb.
Access control listsc.
Local server-based firewallsd.
Hardware-based firewalls136. a.
The use of port knocking or single packet authorization daemons can provide effective protection against zero-day attacks for a small number of users. However, these techniques are not suitable for computing environments with a large number of users. The other three choices are effective protection mechanisms because they are a part of multiple layer security, providing the first line-of-defense. These include implementing access control lists (one layer), restricting network access via local server firewalling (i.e., IP tables) as another layer, and protecting the entire network with a hardware-based firewall (another layer). All three of these layers provide redundant protection in case a compromise in any one of them is discovered.137. A computer fraud occurred using an online accounts receivable database application system. Which of the following logs is
most useful in detecting which data files were accessed from which terminals?a.
Database logb.
Access control security logc.
Telecommunications logd.
Application transaction log137. b.
Access control security logs are detective controls. Access logs show who accessed what data files, when, and from what terminal, including the nature of the security violation. The other three choices are incorrect because database logs, telecommunication logs, and application transaction logs do not show who accessed what data files, when, and from what terminal, including the nature of the security violation.138. Audit trails should be reviewed. Which of the following methods is
not the best way to perform a query to generate reports of selected information?a.
By a known damage or occurrenceb.
By a known user identificationc.
By a known terminal identificationd.
By a known application system name138. a.
Damage or the occurrence of an undesirable event cannot be anticipated or predicted in advance, thus making it difficult to make a query. The system design cannot handle unknown events. Audit trails can be used to review what occurred after an event, for periodic reviews, and for real-time analysis. Reviewers need to understand what normal activity looks like. An audit trail review is easier if the audit trail function can be queried by user ID, terminal ID, application system name, date and time, or some other set of parameters to run reports of selected information. 139. Which of the following can prevent dumpster diving?
a.
Installing surveillance equipmentb.
Using a data destruction processc.
Hiring additional staff to watch data destructiond.
Sending an e-mail message to all employees139. b.
Dumpster diving can be avoided by using a high-quality data destruction process on a regular basis. This should include paper shredding and electrical disruption of data on magnetic media such as tape, cartridge, or disk. 140. Identify the computer-related crime and fraud method that involves obtaining information that may be left in or around a computer system after the execution of a job.
a.
Data diddlingb.
Salami techniquec.
Scavengingd.
Piggybacking