An IS auditor performing an independent classification of systems should consider a situation where functions&
An IS auditor performing an independent classification of systems should consider a situation where functions could be performed manually at a tolerable cost for an extended period of time as:
Which of the following exposures could be caused by a line grabbing technique?
Which of the following exposures could be caused by a line grabbing technique?
Electromagnetic emissions from a terminal represent an exposure because they:
Electromagnetic emissions from a terminal represent an exposure because they:
Security administration procedures require read-only access to:
Security administration procedures require read-only access to:
With the help of a security officer, granting access to data is the responsibility of:
With the help of a security officer, granting access to data is the responsibility of:
The FIRST step in data classification is to:
The FIRST step in data classification is to:
The PRIMARY objective of a logical access control review is to:
The PRIMARY objective of a logical access control review is to:
Naming conventions for system resources are important for access control because they:
Naming conventions for system resources are important for access control because they:
To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should
To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should recommend:
In this situation, the IS auditor is MOST likely to conclude that:
An IS auditor conducting an access control review in a client-server environment discovers that all printing options are accessible by all users. In this situation, the IS auditor is MOST likely to conclude that: