What should IS auditors always check when auditing password files?
What should IS auditors always check when auditing password files?
what layer(s) is/are used to encrypt data?
Using the OSI reference model, what layer(s) is/are used to encrypt data?
When should systems administrators first assess the impact of applications or systems patches?
When should systems administrators first assess the impact of applications or systems patches?
Which of the following is the most fundamental step in preventing virus attacks?
Which of the following is the most fundamental step in preventing virus attacks?
Which of the following is of greatest concern when performing an IS audit?
Which of the following is of greatest concern when performing an IS audit?
What are intrusion-detection systems (IDS) primarily used for?
What are intrusion-detection systems (IDS) primarily used for?
True or false?
Rather than simply reviewing the adequacy of access control, appropriateness of access policies,
and effectiveness of safeguards and procedures, the IS auditor is more concerned with
effectiveness and utilization of assets. True or false?
True or false?
If a programmer has update access to a live system, IS auditors are more concerned with the
programmer’s ability to initiate or modify transactions and the ability to access production than with
the programmer’s ability to authorize transactions. True or false?
Choose the BEST answer
Organizations should use off-site storage facilities to maintain _________________ (fill in the
blank) of current and critical information within backup files. Choose the BEST answer.
The purpose of business continuity planning and disaster-recovery planning is to:
The purpose of business continuity planning and disaster-recovery planning is to: