Which of the following should an IS auditor review to determine user permissions that have been granted for a
.Which of the following should an IS auditor review to determine user permissions that have been
granted for a particular resource? Choose the BEST answer.
What should IS auditors always check when auditing password files?
.What should IS auditors always check when auditing password files?
what layer(s) is/are used to encrypt data?
.Using the OSI reference model, what layer(s) is/are used to encrypt data?
When should systems administrators first assess the impact of applications or systems patches?
.When should systems administrators first assess the impact of applications or systems patches?
Which of the following is the most fundamental step in preventing virus attacks?
.Which of the following is the most fundamental step in preventing virus attacks?
Which of the following is of greatest concern when performing an IS audit?
.Which of the following is of greatest concern when performing an IS audit?
What are intrusion-detection systems (IDS) primarily used for?
.What are intrusion-detection systems (IDS) primarily used for?
True or false?
.Rather than simply reviewing the adequacy of access control, appropriateness of access policies,
and effectiveness of safeguards and procedures, the IS auditor is more concerned with effectiveness
and utilization of assets. True or false?
True or false?
.If a programmer has update access to a live system, IS auditors are more concerned with the
programmer’s ability to initiate or modify transactions and the ability to access production than with
the programmer’s ability to authorize transactions. True or false?
Choose the BEST answer.
.Organizations should use off-site storage facilities to maintain _________________ (fill in the blank)
of current and critical information within backup files. Choose the BEST answer.