The IS auditor should:
An IS auditor finds that a DBA has read and write access to production datA. The IS auditor should:
Minimum password length and password complexity verific…
Minimum password length and password complexity verification are examples of:
What should the IS auditor do next?
During an audit of the logical access control of an ERP financial system an IS auditor found some
user accounts shared by multiple individuals. The user IDs were based on roles rather than
individual identities. These accounts allow access to financial transactions on the ERP. What
should the IS auditor do next?
The responsibility for authorizing access to applicatio…
The responsibility for authorizing access to application data should be with the:
Which of the following is the BEST method for preventin…
Which of the following is the BEST method for preventing the leakage of confidential information in
a laptop computer?
which of the following would BEST protect against ident…
In an online banking application, which of the following would BEST protect against identity theft?
Which of the following is the MOST appropriate approach…
After reviewing its business processes, a large organization is deploying a new web application
based on a VoIP technology. Which of the following is the MOST appropriate approach for
implementing access control that will facilitate security management of the VoIP web application?
Which of the following would prevent unauthorized chang…
Which of the following would prevent unauthorized changes to information stored in a server’s log?
Inadequate programming and coding practices introduce t…
Inadequate programming and coding practices introduce the risk of:
The logical exposure associated with the use of a check…
The logical exposure associated with the use of a checkpoint restart procedure is: