Which of the following controls would be the MOST comprehensive in a remote access network with multiple and d
Which of the following controls would be the MOST comprehensive in a remote access network with multiple and diverse subsystems?
An internet-based attack using password sniffing can:
An internet-based attack using password sniffing can:
The MOST effective control for reducing this exposure is:
During an audit of a telecommunications system, an IS auditor finds that the risk of intercepting data transmitted to and from remote sites is very high. The MOST effective control for reducing this exposure is:
The technique used to ensure security in virtual private networks (VPNs) is:
The technique used to ensure security in virtual private networks (VPNs) is:
When using public key encryption to secure data being transmitted across a network:
When using public key encryption to secure data being transmitted across a network:
Which of the following is the MOST effective type of antivirus software?
Which of the following is the MOST effective type of antivirus software?
An IS auditor performing a telecommunication access control review should be concerned PRIMARILY with the:
An IS auditor performing a telecommunication access control review should be concerned PRIMARILY with the:
Which of the following risks is MOST often associated with system development using 4GLs?
IS management has decided to rewrite a legacy customer relations system using fourth generation
languages (4GLs). Which of the following risks is MOST often associated with system
development using 4GLs?
Which of the following would be the BEST method for ensuring that critical fields in a master record have been
Which of the following would be the BEST method for ensuring that critical fields in a master
record have been updated properly?
Which of the following is a dynamic analysis tool for the purpose of testing software modules?
Which of the following is a dynamic analysis tool for the purpose of testing software modules?