What are intrusion-detection systems (IDS) primarily used for?
What are intrusion-detection systems (IDS) primarily used for?
Which of the following processes contained in the Value Governance domain of Val IT establishes the organizati
Which of the following processes contained in the Value Governance domain of Val IT establishes
the organizational structures?
By doing so, the net effect will be to PRIMARILY reduce the:
An information security manager has been assigned to implement more restrictive preventive
controls. By doing so, the net effect will be to PRIMARILY reduce the:
What also should the project manager update based on these scope changes?
Your project change control board has approved several scope changes that will drastically alter
your project plan. You and the project team set about updating the project scope, the WBS, the
WBS dictionary, the activity list, and the project network diagram. There are also some changes
caused to the project risks, communication, and vendors. What also should the project manager
update based on these scope changes?
True or false?
Rather than simply reviewing the adequacy of access control, appropriateness of access policies,
and effectiveness of safeguards and procedures, the IS auditor is more concerned with
effectiveness and utilization of assets. True or false?
Which of the following activity loops describes improvement of the existing processes?
Which of the following activity loops describes improvement of the existing processes?
which of the following is MOST important to estimate the potential loss?
When performing a quantitative risk analysis, which of the following is MOST important to estimate
the potential loss?
which of the following do this monitoring tool focuses?
You are the risk control professional of your enterprise. You have implemented a tool that
correlates information from multiple sources. To which of the following do this monitoring tool
focuses?
True or false?
If a programmer has update access to a live system, IS auditors are more concerned with the
programmer’s ability to initiate or modify transactions and the ability to access production than with
the programmer’s ability to authorize transactions. True or false?
Which of the following strategies includes marketing strategies, new product development strategies, HR strate
Which of the following strategies includes marketing strategies, new product development
strategies, HR strategies and, financial strategies?