Users are issued security tokens to be used in combination with a PIN to access the corporate virtual private
Users are issued security tokens to be used in combination with a PIN to access the corporate virtual private network (VPN). Regarding the PIN, what is the MOST important rule to be included in a security policy?
Which of the following fire suppression systems is MOST appropriate to use in a data center environment?
Which of the following fire suppression systems is MOST appropriate to use in a data center environment?
During the review of a biometrics system operation, an IS auditor should FIRST review the stage of:
During the review of a biometrics system operation, an IS auditor should FIRST review the stage of:
An accuracy measure for a biometric system is:
An accuracy measure for a biometric system is:
What is a risk associated with attempting to control physical access to sensitive areas such as computer rooms
What is a risk associated with attempting to control physical access to sensitive areas such as computer rooms using card keys or locks?
An organization with extremely high security requirements is evaluating the effectiveness of biometric systems
An organization with extremely high security requirements is evaluating the effectiveness of biometric systems. Which of the following performance indicators is MOST important?
The MOST effective control for addressing the risk of piggybacking is:
The MOST effective control for addressing the risk of piggybacking is:
The BEST overall quantitative measure of the performance of biometric control devices is:
The BEST overall quantitative measure of the performance of biometric control devices is:
Which of the following is the MOST effective control over visitor access to a data center?
Which of the following is the MOST effective control over visitor access to a data center?
The use of residual biometric information to gain unauthorized access is an example of which of the following
The use of residual biometric information to gain unauthorized access is an example of which of the following attacks?