monthly reports for IS auditors?
Which of the following is the BEST type of program for an organization to implement to aggregate, correlate and store different log and event files, and then produce weekly and
monthly reports for IS auditors?
Doing which of the following during peak production hours could result in unexpected downtime?
Doing which of the following during peak production hours could result in unexpected downtime?
When reviewing a hardware maintenance program, an IS auditor should assess whether:
When reviewing a hardware maintenance program, an IS auditor should assess whether:
Which of the following is the MOST effective compensating control for this weakness?
An IS auditor observes a weakness in the tape management system at a data center in that some parameters are set to bypass or ignore tape header records. Which of the following is the MOST effective compensating control for this weakness?
The BEST way to minimize the risk of communication failures in an e-commerce environment would be to use:
The BEST way to minimize the risk of communication failures in an e-commerce environment would be to use:
The IS auditor should recommend the implementation of:
An IS auditor reviewing an organization’s data file control procedures finds that transactions are applied to the most current files, while restart procedures use earlier versions. The IS auditor should recommend the implementation of:
Which of the following BEST limits the impact of server failures in a distributed environment?
Which of the following BEST limits the impact of server failures in a distributed environment?
This would result in:
The database administrator (DBA) suggests that DB efficiency can be improved by denormalizing some tables. This would result in:
Web and e-mail filtering tools are PRIMARILY valuable to an organization because they:
Web and e-mail filtering tools are PRIMARILY valuable to an organization because they:
The MOST significant security concern when using flash memory (e.g., USB removable disk) is that the:
The MOST significant security concern when using flash memory (e.g., USB removable disk) is that the: