Which of the following satisfies a two-factor user authentication?
Which of the following satisfies a two-factor user authentication?
What is the MOST effective method of preventing unauthorized use of data files?
What is the MOST effective method of preventing unauthorized use of data files?
Which of the following is the PRIMARY safeguard for securing software and data within an information processin
Which of the following is the PRIMARY safeguard for securing software and data within an information processing facility?
When reviewing an organizations logical access security, which of the following should be of MOST concern to a
When reviewing an organizations logical access security, which of the following should be of MOST concern to an IS auditor?
Passwords should be:A. assigned by the security administrator for first time logon.
Passwords should be:A. assigned by the security administrator for first time logon.
When performing an audit of access rights, an IS auditor should be suspicious of which of the following if all
When performing an audit of access rights, an IS auditor should be suspicious of which of the following if allocated to a computer operator?
To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should
To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should recommend:
An IS auditor conducting an access control review in a client-server environment discovers that all printing o
An IS auditor conducting an access control review in a client-server environment discovers that all printing options are accessible by all users. In this situation, the IS auditor is MOST likely to conclude that:
Sign-on procedures include the creation of a unique user ID and password. However, an IS auditor discovers tha
Sign-on procedures include the creation of a unique user ID and password. However, an IS auditor discovers that in many cases the username and password are the same. The BEST control to mitigate this risk is to:
The PRIMARY objective of a logical access control review is to:
The PRIMARY objective of a logical access control review is to: