Which of the following satisfies a two-factor user authentication?
Which of the following satisfies a two-factor user authentication?
What is the MOST effective method of preventing unauthorized use of data files?
What is the MOST effective method of preventing unauthorized use of data files?
Which of the following is the PRIMARY safeguard for securing software and data within an information processin
Which of the following is the PRIMARY safeguard for securing software and data within an
information processing facility?
Which of the following is a benefit of using a callback device?
Which of the following is a benefit of using a callback device?
which of the following should be of MOST concern to an IS auditor?
When reviewing an organization’s logical access security, which of the following should be of MOST
concern to an IS auditor?
Passwords should be:
Passwords should be:
which of the following if allocated to a computer operator?
When performing an audit of access rights, an IS auditor should be suspicious of which of the
following if allocated to a computer operator?
To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should
To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS
auditor should recommend:
In this situation, the IS auditor is MOST likely to conclude that:
An IS auditor conducting an access control review in a client-server environment discovers that all
printing options are accessible by all users. In this situation, the IS auditor is MOST likely to conclude
that:
The BEST control to mitigate this risk is to:
Sign-on procedures include the creation of a unique user ID and password. However, an IS auditor
discovers that in many cases the username and password are the same. The BEST control to mitigate
this risk is to: