Which of the following intrusion detection systems (IDSs) will MOST likely generate false alarms resulting fro
Which of the following intrusion detection systems (IDSs) will MOST likely generate false alarms
resulting from normal network activity?
When auditing security for a data center, an IS auditor should look for the presence of a voltage regulator to
When auditing security for a data center, an IS auditor should look for the presence of a voltage
regulator to ensure that the:
Which of the following methods of suppressing a fire in a data center is the MOST effective and environmentall
Which of the following methods of suppressing a fire in a data center is the MOST effective and
environmentally friendly?
Which of the following environmental controls is appropriate to protect computer equipment against short-term
Which of the following environmental controls is appropriate to protect computer equipment
against short-term reductions in electrical power?
Which ofthe following should be given the HIGHEST priority in the auditor’s report?
An IS auditor inspected a windowless room containing phone switching and networking equipment
and documentation binders. The room was equipped with two handheld fire extinguishers-one filled
with CO2, the other filled with halon. Which ofthe following should be given the HIGHEST priority in
the auditor’s report?
Which of the following would be BEST prevented by a raised floor in the computer machine room?
Which of the following would be BEST prevented by a raised floor in the computer machine room?
A penetration test performed as part of evaluating network security:
A penetration test performed as part of evaluating network security:
what is the MOST important rule to be included in a security policy?
Users are issued security tokens to be used in combination with a PIN to access the
corporate virtual private network (VPN). Regarding the PIN, what is the MOST important rule to be
included in a security policy?
Which of the following fire suppression systems is MOST appropriate to use in a data center environment?
Which of the following fire suppression systems is MOST appropriate to use in a data center
environment?
During the review of a biometrics system operation, an IS auditor should FIRST review the stage of:
During the review of a biometrics system operation, an IS auditor should FIRST review the stage of: