Which of the following refers to the collection of policies and procedures for implementing controls capable of
restricting access to computer software and data files?
A trojan horse simply cannot operate autonomously.
Creating which of the following is how a hacker can insure his ability to return to the hacked system at will?A. rootsec
Which of the following is not a good tactic to use against hackers?
The sophistication and formality of IS audit programs may vary significantly depending on which of the following factors?
Which of the following is one most common way that spyware is distributed?
Properly planned risk-based audit programs are often capable of offering which of the following benefits?
Which of the following should be seen as one of the most significant factors considered when determining the
frequency of IS audits within your organization?
For application acquisitions with significant impacts, participation of your IS audit team should be encouraged:A. early in the due diligence stage.
A comprehensive IS audit policy should include guidelines detailing what involvement the internal audit team