When reviewing a hardware maintenance program, an IS auditor should assess whether:
When reviewing a hardware maintenance program, an IS auditor should assess whether:
Which of the following is the MOST effective compensating control for this weakness?
An IS auditor observes a weakness in the tape management system at a data center in that some
parameters are set to bypass or ignore tape header records. Which of the following is the MOST
effective compensating control for this weakness?
To verify that the correct version of a data file was used for a production run, an IS auditor should review:
To verify that the correct version of a data file was used for a production run, an IS auditor should
review:
Which of the following is the BEST type of program for an organization to implement to aggregate, correlate an
Which of the following is the BEST type of program for an organization to implement to aggregate,
correlate and store different log and event files, and then produce weekly and monthly reports for
IS auditors?
which of the following during peak production hours could result in unexpected downtime?
Doing which of the following during peak production hours could result in unexpected downtime?
Which of the following would BEST maintain the integrity of a firewall log?
Which of the following would BEST maintain the integrity of a firewall log?
Which of the following will prevent dangling tuples in a database?
Which of the following will prevent dangling tuples in a database?
The objective of concurrency control in a database system is to:
The objective of concurrency control in a database system is to:
Which of the following controls would provide the GREATEST assurance of database integrity?
Which of the following controls would provide the GREATEST assurance of database integrity?
Which of the following transaction processing features has been violated?
An IS auditor analyzing the audit log of a database management system (DBMS) finds that some
transactions were partially executed as a result of an error, and are not rolled back. Which of the
following transaction processing features has been violated?