Which of the following intrusion detection systems (IDS…
Which of the following intrusion detection systems (IDSs) will MOST likely generate false alarms
resulting from normal network activity?
Which of the following security measures is MOST approp…
IS management is considering a Voice-over Internet Protocol (VoIP) network to reduce
telecommunication costs and management asked the IS auditor to comment on appropriate
security controls. Which of the following security measures is MOST appropriate?
Upon receipt of the initial signed digital certificate …
Upon receipt of the initial signed digital certificate the user will decrypt the certificate with the public
key of the:
A perpetrator looking to gain access to and gather info…
A perpetrator looking to gain access to and gather information about encrypted data being
transmitted over the network would use:
Which of the following would effectively verify the ori…
Which of the following would effectively verify the originator of a transaction?
When using a digital signature, the message digest is c…
When using a digital signature, the message digest is computed:
which of the following findings represents the MOST sig…
When reviewing a digital certificate verification process, which of the following findings represents
the MOST significant risk?
The MOST effective control for reducing the risk relate…
The MOST effective control for reducing the risk related to phishing is:
The GREATEST risk posed by an improperly implemented in…
The GREATEST risk posed by an improperly implemented intrusion prevention system (IPS) is:
Which of the following represents the GREATEST vulnerab…
An IS auditor is reviewing a software-based firewall configuration. Which of the following
represents the GREATEST vulnerability? The firewall software: