Naming conventions for system resources are important for access control because they:
Naming conventions for system resources are important for access control because they:
The PRIMARY objective of a logical access control review is to:
The PRIMARY objective of a logical access control review is to:
The BEST control to mitigate this risk is to:
Sign-on procedures include the creation of a unique user ID and password. However, an IS auditor discovers that in many cases the username and password are the same. The BEST control to mitigate this risk is to:
In this situation, the IS auditor is MOST likely to conclude that:
An IS auditor conducting an access control review in a client-server environment discovers that all printing options are accessible by all users. In this situation, the IS auditor is MOST likely to conclude that:
To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should
To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should recommend:
When performing an audit of access rights, an IS auditor should be suspicious of which of the following if all
When performing an audit of access rights, an IS auditor should be suspicious of which of the following if allocated to a computer operator?
Passwords should be:
Passwords should be:
When reviewing an organization’s logical access security, which of the following should be of MOST conce
When reviewing an organization’s logical access security, which of the following should be of MOST concern to an IS auditor?
Which of the following is a benefit of using a callback device?
Which of the following is a benefit of using a callback device?
Which of the following is the PRIMARY safeguard for securing software and data within an information processin
Which of the following is the PRIMARY safeguard for securing software and data within an information processing facility?