A penetration test performed as part of evaluating netw…
A penetration test performed as part of evaluating network security:
Which of the following would be BEST prevented by a rai…
Which of the following would be BEST prevented by a raised floor in the computer machine room?
Which ofthe following should be given the HIGHEST prior…
An IS auditor inspected a windowless room containing phone switching and networking equipment
and documentation binders. The room was equipped with two handheld fire extinguishers-one filled
with CO2, the other filled with halon. Which ofthe following should be given the HIGHEST priority
in the auditor’s report?
Which of the following environmental controls is approp…
Which of the following environmental controls is appropriate to protect computer equipment against
short-term reductions in electrical power?
Which of the following methods of suppressing a fire in…
Which of the following methods of suppressing a fire in a data center is the MOST effective and
environmentally friendly?
When auditing security for a data center, an IS auditor…
When auditing security for a data center, an IS auditor should look for the presence of a voltage
regulator to ensure that the:
Which of the following intrusion detection systems (IDS…
Which of the following intrusion detection systems (IDSs) will MOST likely generate false alarms
resulting from normal network activity?
Which of the following security measures is MOST approp…
IS management is considering a Voice-over Internet Protocol (VoIP) network to reduce
telecommunication costs and management asked the IS auditor to comment on appropriate
security controls. Which of the following security measures is MOST appropriate?
Upon receipt of the initial signed digital certificate …
Upon receipt of the initial signed digital certificate the user will decrypt the certificate with the public
key of the:
A perpetrator looking to gain access to and gather info…
A perpetrator looking to gain access to and gather information about encrypted data being
transmitted over the network would use: