Neural networks are effective in detecting fraud becaus…
Neural networks are effective in detecting fraud because they can:
Which of the following types of firewalls would BEST pr…
Which of the following types of firewalls would BEST protect a network from an internet attack?
Which of the following line media would provide the BES…
Which of the following line media would provide the BEST security for a telecommunication network?
Which of the following could be caused by the length of…
An installed Ethernet cable run in an unshielded twisted pair (UTP) network is more than 100 meters
long. Which of the following could be caused by the length of the cable?
Which of the following is a control over component comm…
Which of the following is a control over component communication failure/errors?
When reviewing system parameters, an IS auditor’s PRIMA…
When reviewing system parameters, an IS auditor’s PRIMARY concern should be that:
which of the following control techniques is used to in…
In a client-server system, which of the following control techniques is used to inspect activity from
known or unknown users?
Which of the following BEST reduces the ability of one …
Which of the following BEST reduces the ability of one device to capture the packets that are meant
for another device?
The IS auditor should be MOST concerned if a hacker:
An IS auditor is performing a network security review of a telecom company that provides Internet
connection services to shopping malls for their wireless customers. The company uses Wireless
Transport Layer Security (WTLS) and Secure Sockets Layer (SSL) technology for protecting their
customer’s payment information. The IS auditor should be MOST concerned if a hacker:
which represents the GREATEST concern?
A company is implementing a dynamic host configuration protocol (DHCP). Given that the following
conditions exist, which represents the GREATEST concern?