Which of the following would be a valid reason for movi…
An organization is using symmetric encryption. Which of the following would be a valid reason for
moving to asymmetric encryption? Symmetric encryption:
Which of the following BEST describes the role of a dir…
Which of the following BEST describes the role of a directory server in a public key infrastructure
(PKI)?
An IS auditor reviewing the implementation of an intrus…
An IS auditor reviewing the implementation of an intrusion detection system (IDS) should be MOST
concerned if:
To prevent IP spoofing attacks, a firewall should be co…
To prevent IP spoofing attacks, a firewall should be configured to drop a packet if:
An IS auditor reviewing access controls for a client-se…
An IS auditor reviewing access controls for a client-server environment should FIRST:
In auditing a web server, an IS auditor should be conce…
In auditing a web server, an IS auditor should be concerned about the risk of individuals gaining
unauthorized access to confidential information through:
A virtual private network (VPN) provides data confident…
A virtual private network (VPN) provides data confidentiality by using:
This practice:
An IS auditor reviewing wireless network security determines that the Dynamic Host Configuration
Protocol is disabled at all wireless access points. This practice:
This objective can be achieved by:
An investment advisor e-mails periodic newsletters to clients and wants reasonable assurance that
no one has modified the newsletter. This objective can be achieved by:
Which of the following would BEST justify the IS audito…
An organization has a mix of access points that cannot be upgraded to stronger security and newer
access points having advanced wireless security. An IS auditor recommends replacing the
nonupgradeabie access points. Which of the following would BEST justify the IS auditor’s
recommendation?