Which of the following exposures could be caused by a l…
Which of the following exposures could be caused by a line grabbing technique?
Naming conventions for system resources are important f…
Naming conventions for system resources are important for access control because they:
Naming conventions for system resources are important f…
Naming conventions for system resources are important for access control because they:
The PRIMARY objective of a logical access control revie…
The PRIMARY objective of a logical access control review is to:
The PRIMARY objective of a logical access control revie…
The PRIMARY objective of a logical access control review is to:
The BEST control to mitigate this risk is to:
Sign-on procedures include the creation of a unique user ID and password. However, an IS auditor discovers
that in many cases the username and password are the same. The BEST control to mitigate this risk is to:
In this situation, the IS auditor is MOST likely to con…
An IS auditor conducting an access control review in a client-server environment discovers that all printing
options are accessible by all users. In this situation, the IS auditor is MOST likely to conclude that:
To prevent unauthorized entry to the data maintained in…
To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should
recommend:
which of the following if allocated to a computer operator?
When performing an audit of access rights, an IS auditor should be suspicious of which of the following if
allocated to a computer operator?
Passwords should be:
Passwords should be: