Which of the following is MOST important for an IS auditor to determine when reviewing how the organization’s incident response team handles devices that may be involved in criminal activity?
Which of the following is MOST important for an IS auditor to determine when reviewing how the organization’s incident response team handles devices that may be involved in criminal activity?A . Whether devices are checked for malicious applicationsB . Whether the access logs are checked before seizing the devicesC ....
Which of the following is an analytical review procedure for a payroll system?
Which of the following is an analytical review procedure for a payroll system?A . Performing penetration attempts on the payroll systemB . Evaluating the performance of the payroll system, using benchmarking softwareC . Performing reasonableness tests by multiplying the number of employees by the average wage rateD . Testing hours...
Implementing which of the following would have prevented this situation?
During a privileged access review, an IS auditor observes many help desk employees have privileges within systems not required for their job functions. Implementing which of the following would have prevented this situation?A . Separation of dutiesB . Multi-factor authenticationC . Least privilege accessD . Privileged access reviewsView AnswerAnswer: C
You are part of a security staff at a highly profitable bank and each day, all traffic on the network is logged for later review. Every Friday when major deposits are made you're seeing a series of bits placed in the "Urgent Pointer" field of a TCP packet.
You are part of a security staff at a highly profitable bank and each day, all traffic on the network is logged for later review. Every Friday when major deposits are made you're seeing a series of bits placed in the "Urgent Pointer" field of a TCP packet. This is...
During a follow-up audit, an IS auditor learns the organization implemented an automated process instead of the originally agreed upon enhancement of the manual process. The auditor should:
During a follow-up audit, an IS auditor learns the organization implemented an automated process instead of the originally agreed upon enhancement of the manual process. The auditor should:A . report the finding that recommendations were not acted uponB . perform a cost-benefit analysis on the new processC . verify that...
Which of the following statement INCORRECTLY describes the traditional audit approach in comparison to the Control self-assessment approach?
Which of the following statement INCORRECTLY describes the traditional audit approach in comparison to the Control self-assessment approach?A . In traditional approach, Staffs at all level, in all functions, are the primary control analyst.B . Traditional approach assigns duties/supervises staffC . Traditional approach is a policy driven approachD . Traditional...
An IS auditor observes a system performance monitoring tool which states that a server critical to the organization averages high CPU utilization across a cluster of four virtual servers throughout the audit period.
An IS auditor observes a system performance monitoring tool which states that a server critical to the organization averages high CPU utilization across a cluster of four virtual servers throughout the audit period. To determine if further investigation is required, an IS auditor should review:A . the system process activity...
A shared resource matrix is a technique commonly used to locate:
A shared resource matrix is a technique commonly used to locate:A . Malicious codeB . Security flawsC . Trap doorsD . Covert channelsView AnswerAnswer: D Explanation: Analyzing resources of a system is one standard for locating covert channels because the basis of a covert channel is a shared resource. The...
Which of the following statement INCORRECTLY describes the Control self-assessment (CSA) approach?
Which of the following statement INCORRECTLY describes the Control self-assessment (CSA) approach? A. CSA is policy or rule driven B. CSA Empowered/accountable employees C. CSA focuses on continuous improvement/learning curve D. In CSA, Staffs at all level, in all functions, are the primary control analyst.View AnswerAnswer: A Explanation: The word...
You are part of a security staff at a highly profitable bank and each day, all traffic on the network is logged for later review. Every Friday when major deposits are made you're seeing a series of bits placed in the "Urgent Pointer" field of a TCP packet.
You are part of a security staff at a highly profitable bank and each day, all traffic on the network is logged for later review. Every Friday when major deposits are made you're seeing a series of bits placed in the "Urgent Pointer" field of a TCP packet. This is...