Which of the following is the PRIMARY safeguard for securing software and data within an information processin
Which of the following is the PRIMARY safeguard for securing software and data within an
information processing facility?
Which of the following is a benefit of using a callback device?
Which of the following is a benefit of using a callback device?
which of the following should be of MOST concern to an IS auditor?
When reviewing an organization’s logical access security, which of the following should be of
MOST concern to an IS auditor?
Passwords should be:
Passwords should be:
which of the following if allocated to a computer operator?
When performing an audit of access rights, an IS auditor should be suspicious of which of the
following if allocated to a computer operator?
To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should
To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS
auditor should recommend:
In this situation, the IS auditor is MOST likely to conclude that:
An IS auditor conducting an access control review in a client-server environment discovers that all
printing options are accessible by all users. In this situation, the IS auditor is MOST likely to
conclude that:
The BEST control to mitigate this risk is to:
Sign-on procedures include the creation of a unique user ID and password. However, an IS
auditor discovers that in many cases the username and password are the same. The BEST
control to mitigate this risk is to:
The PRIMARY objective of a logical access control review is to:
The PRIMARY objective of a logical access control review is to:
Naming conventions for system resources are important for access control because they:
Naming conventions for system resources are important for access control because they: