Which of the following is the MOST effective compensating control for this weakness?
An IS auditor observes a weakness in the tape management system at a data center in that some
parameters are set to bypass or ignore tape header records. Which of the following is the MOST
effective compensating control for this weakness?
The PRIMARY purpose of performing an internal attack and penetration test as part of an incident response prog
The PRIMARY purpose of performing an internal attack and penetration test as part of an incident
response program is to identify:
To verify that the correct version of a data file was used for a production run, an IS auditor should review:
To verify that the correct version of a data file was used for a production run, an IS auditor should
review:
Which of the following would represent a violation of the chain of custody when a backup tape has been identif
Which of the following would represent a violation of the chain of custody when a backup tape has
been identified as evidence in a fraud investigation? The tape was:
which of the following during peak production hours could result in unexpected downtime?
Doing which of the following during peak production hours could result in unexpected downtime?
Which of the following is the BEST type of program for an organization to implement to aggregate, correlate an
Which of the following is the BEST type of program for an organization to implement to aggregate,
correlate and store different log and event files, and then produce weekly and monthly reports for
IS auditors?
which of the following would MOST effectively support an information security manager in handling a security b
When properly tested, which of the following would MOST effectively support an information
security manager in handling a security breach?
Which of the following would BEST maintain the integrity of a firewall log?
Which of the following would BEST maintain the integrity of a firewall log?
What is the MOST appropriate next step?
Isolation and containment measures lor a compromised computer have been taken and
information security management is now investigating. What is the MOST appropriate next step?
Which of the following will prevent dangling tuples in a database?
Which of the following will prevent dangling tuples in a database?