Which of the following data destruction methods would be the MOST effective?
An organization is disposing of a number of laptop computers. Which of the following data
destruction methods would be the MOST effective?
To ensure authentication, confidentiality and integrity of a message, the sender should encrypt the hash of th
To ensure authentication, confidentiality and integrity of a message, the sender should encrypt the
hash of the message with the sender’s:
Which of the following would be the MOST significant audit finding when reviewing a point-of-sale (POS) system
Which of the following would be the MOST significant audit finding when reviewing a
point-of-sale (POS) system?
which of the following should be the GREATEST concern for the IS auditor?
When reviewing the procedures for the disposal of computers, which of the following
should be the GREATEST concern for the IS auditor?
Which of the following would be of the most importance?
At a hospital, medical personal carry handheld computers which contain patient health data. These
handheld computers are synchronized with PCs which transfer data from a hospital database. Which
of the following would be of the most importance?
Which of the following would BEST support 24/7 availability?
Which of the following would BEST support 24/7 availability?
The PRIMARY purpose of implementing Redundant Array of Inexpensive Disks (RAID) level 1 in a file server is to
The PRIMARY purpose of implementing Redundant Array of Inexpensive Disks (RAID) level 1 in a file
server is to:
Which of the following is the MOST important criterion when selecting a location for an offsite storage facili
Which of the following is the MOST important criterion when selecting a location for an offsite
storage facility for IS backup files? The offsite facility must be:
where should the process begin following an interruption?
If a database is restored using before-image dumps, where should the process begin following an
interruption?
which of the following is an important consideration in providing backup for online systems?
In addition to the backup considerations for all systems, which of the following is an important
consideration in providing backup for online systems?