Which of the following is the MOST effective method for…
Which of the following is the MOST effective method for dealing with the spreading of a network
worm that exploits vulnerability in a protocol?
The FIRST step in managing the risk of a cyber attack is to:
The FIRST step in managing the risk of a cyber attack is to:
Which is the MOST serious risk associated with such tools?
After installing a network, an organization installed a vulnerability assessment tool or security
scanner to identify possible weaknesses. Which is the MOST serious risk associated with such
tools?
Which of the following is the MOST appropriate suggesti…
Time constraints and expanded needs have been found by an IS auditor to be the root causes for
recent violations of corporate data definition standards in a new business intelligence project.
Which of the following is the MOST appropriate suggestion for an auditor to make?
Which of the following will BEST control the risk in th…
In a small organization, developers may release emergency changes directly to production. Which
of the following will BEST control the risk in this situation?
The MOST significant concern an IS auditor should have …
An IS auditor notes that patches for the operating system used by an organization are deployed by
the IT department as advised by the vendor. The MOST significant concern an IS auditor should
have with this practice is the nonconsideration bylT of:
Which of the following processes should an IS auditor r…
Which of the following processes should an IS auditor recommend to assist in the recording of
baselines for software releases?
Which of the following controls wou Id BEST mitigate th…
An IS auditor discovers that developers have operator access to the command line of a production
environment operating system. Which of the following controls wou Id BEST mitigate the risk of
undetected and unauthorized program changes to the production environment?
Which of the following would be the MOST secure way of …
The application systems of an organization using open-source software have no single recognized
developer producing patches. Which of the following would be the MOST secure way of updating
open-source software?
To determine if unauthorized changes have been made to …
To determine if unauthorized changes have been made to production code the BEST audit
procedure is to: