which of the following?
A database was compromised by guessing the password for a shared administrative account and
confidential customer information was stolen. The information security manager was able to detect
this breach by analyzing which of the following?
In regard to moving an application program from the test environment to the production environment, the BEST c
In regard to moving an application program from the test environment to the production
environment, the BEST control would be to have the:
Which of the following is an example of a corrective control?
Which of the following is an example of a corrective control?
which of the following would be considered an adequate set of compensating controls?
An IS auditor reviewing database controls discovered that changes to the database during normal
working hours were handled through a standard set of procedures. However, changes made after
normal hours required only an abbreviated number of steps. Inthis situation, which of the following
would be considered an adequate set of compensating controls?
Which of the following BEST facilitates the correlation and review of these logs?
To determine how a security breach occurred on the corporate network, a security manager looks
at the logs of various devices. Which of the following BEST facilitates the correlation and review of
these logs?
Which of the following tests performed by an IS auditor would be the MOST effective in determining compliance
Which of the following tests performed by an IS auditor would be the MOST effective in
determining compliance with an organization’s change control procedures?
The BEST course of action is to:
An organization has been experiencing a number of network-based security attacks that all appear
to originate internally. The BEST course of action is to:
Which of the following should be the IS auditor’s next action?
An IS auditor reviewing a database application discovers that the current configuration does not
match the originally designed structure. Which of the following should be the IS auditor’s next
action?
Which of the following should be the immediate action of the information security manager?
A serious vulnerability is reported in the firewall software used by an organization. Which of the
following should be the immediate action of the information security manager?
Which of the following would MOST effectively detect the malicious activity?
A programmer maliciously modified a production program to change data and then restored the
original code. Which of the following would MOST effectively detect the malicious activity?