Which of the following would be BEST prevented by a rai…
Which of the following would be BEST prevented by a raised floor in the computer machine room?
Which ofthe following should be given the HIGHEST prior…
An IS auditor inspected a windowless room containing phone switching and networking equipment and
documentation binders. The room was equipped with two handheld fire extinguishers-one filled with CO2, the
other filled with halon. Which ofthe following should be given the HIGHEST priority in the auditor’s report?
Which of the following environmental controls is approp…
Which of the following environmental controls is appropriate to protect computer equipment against short-term
reductions in electrical power?
Which of the following methods of suppressing a fire in…
Which of the following methods of suppressing a fire in a data center is the MOST effective and
environmentally friendly?
Which of the following methods of suppressing a fire in…
Which of the following methods of suppressing a fire in a data center is the MOST effective and
environmentally friendly?
When auditing security for a data center, an IS auditor…
When auditing security for a data center, an IS auditor should look for the presence of a voltage regulator to
ensure that the:
Which of the following intrusion detection systems (IDS…
Which of the following intrusion detection systems (IDSs) will MOST likely generate false alarms resulting from
normal network activity?
Which of the following security measures is MOST approp…
IS management is considering a Voice-over Internet Protocol (VoIP) network to reduce telecommunication
costs and management asked the IS auditor to comment on appropriate security controls. Which of the
following security measures is MOST appropriate?
Upon receipt of the initial signed digital certificate …
Upon receipt of the initial signed digital certificate the user will decrypt the certificate with the public key of the:
A perpetrator looking to gain access to and gather info…
A perpetrator looking to gain access to and gather information about encrypted data being transmitted over the
network would use: