Which of the following is the best way to minimize data leakage during data transfer?
Which of the following is the best way to minimize data leakage during data transfer?A . Digital signatureB . Virtual Local Area NetworkC . Storage encryptionD . Virtual Private NetworkView AnswerAnswer: C
In this case, which one is the biggest risk?
The company's operational procedures require urgent changes to be approved for business within 7 days of the occurrence. The Information Systems Auditor indicates that the manager verifies process compliance by performing a monthly review via uncompleted urgent change. In this case, which one is the biggest risk?A . Audit...
A system that is undergoing acceptance testing is also making small changes to the program that can be banned by what requirements of the acceptance test strategy:
A system that is undergoing acceptance testing is also making small changes to the program that can be banned by what requirements of the acceptance test strategy:A . Strength test.B . Exit condition.C . Stop condition.D . Enter condition.View AnswerAnswer: D
Which of the following is the best way to prevent receiving bad data?
A company plans to have automated data feeds from third-party service providers into enterprise data warehousing. Which of the following is the best way to prevent receiving bad data?A . Implement business rules to reject invalid dataB . Purchase data cleanup tools from reputable suppliersC . Appointment of data...
Which of the following should be based on the priority of the incident response measures?
Which of the following should be based on the priority of the incident response measures?A . Problem escalation processB . Business impactC . Personnel availabilityD . Disaster scopeView AnswerAnswer: B
When reviewing the procurement of new equipment, which of the following is considered a significant weakness by the information systems auditor?
When reviewing the procurement of new equipment, which of the following is considered a significant weakness by the information systems auditor?A . The final evaluation criteria are determined after the supplier’s response has been studied.B . The response deadline was postponed at the request of the supplier.C . The...
Which of the following audit results is the biggest concern when reviewing a disaster recovery plan with high availability requirements?
Which of the following audit results is the biggest concern when reviewing a disaster recovery plan with high availability requirements?A . Undefined recovery time targetB . Disaster recovery testing is not requiredC . Current supplier contact information is not includedD . Undefined recovery team responsibilityView AnswerAnswer: B
In order to ensure that the firewall can effectively protect the network from external attacks, which of the following basic practices should be followed?
In order to ensure that the firewall can effectively protect the network from external attacks, which of the following basic practices should be followed?A . Only allow the necessary external services.B . All external communications must go through firewall.C . The firewall must be placed in non-protected area (DMZ)D...
Which of the following is the best advice for an information systems auditor to protect data when it prevents similar incidents from happening again?
Several portable computers containing customer-sensitive data were stolen from the staff's office because they were unattended. Which of the following is the best advice for an information systems auditor to protect data when it prevents similar incidents from happening again?A . Enhance physical securityB . Encrypted disk driveC ....
The information system auditor did not find out which of the following terms can be identified by the risk of an error?
The information system auditor did not find out which of the following terms can be identified by the risk of an error?A . DetectionB . PreventionC . ControlD . InherentView AnswerAnswer: A