<< Prev Question Next Question >>

Question 18/803

Which of the following is the GREATEST advantage of elliptic curve encryption over RSA encryption?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (803q)
Question 1: Which of the following processes are performed during the de...
Question 2: Responsibility and reporting lines cannot always be establis...
Question 3: Which of the following user profiles should be of MOST conce...
Question 4: To affix a digital signature to a message, the sender must f...
Question 5: What process allows IS management to determine whether the a...
Question 6: The GREATEST risk when end users have access to a database a...
Question 7: In which of the following database models is the data repres...
Question 8: Which of the following is the BEST way to satisfy a two-fact...
Question 9: Which of the following is BEST suited for secure communicati...
Question 10: Which of the following should concern an IS auditor when rev...
Question 11: Which of the following environmental controls is appropriate...
Question 12: Which of the following virus prevention techniques can be im...
Question 13: What is used to develop strategically important systems fast...
Question 14: Which of the following cryptography options would increase o...
Question 15: Which of the following database controls would ensure that t...
Question 16: Which of the following is the MOST effective control over vi...
Question 17: A company has recently upgraded its purchase system to incor...
Question 18: Which of the following is the GREATEST advantage of elliptic...
Question 19: Which of the following attack is against computer network an...
Question 20: Which of the following would MOST effectively reduce social ...
Question 21: Assuming this diagram represents an internal facility and th...
Question 22: Which of the following is the MOST reliable sender authentic...
Question 23: Which of the following BEST describes the role of a director...
Question 24: Proper segregation of duties does not prohibit a quality con...
Question 25: When should plans for testing for user acceptance be prepare...
Question 26: Which of the following tests performed by an IS auditor woul...
Question 27: Transmitting redundant information with each character or fr...
Question 28: During an audit of a business continuity plan (BCP), an IS a...
Question 29: What should IS auditors always check when auditing password ...
Question 30: Which of the following would be considered an essential feat...
Question 31: The PRIMARY objective of a logical access control review is ...
Question 32: In an online banking application, which of the following wou...
Question 33: Which of the following type of network service is used by ne...
Question 34: Which of the following activities should the business contin...
Question 35: At a hospital, medical personal carry handheld computers whi...
Question 36: Which of the following layer in an enterprise data flow arch...
Question 37: What is an acceptable mechanism for extremely time-sensitive...
Question 38: Use of asymmetric encryption in an internet e-commerce site,...
Question 39: While copying files from a floppy disk, a user introduced a ...
Question 40: An IS auditor finds out-of-range data in some tables of a da...
Question 41: Change management procedures are established by IS managemen...
Question 42: How does the digital envelop work? What are the correct step...
Question 43: After an IS auditor has identified threats and potential imp...
Question 44: What should regression testing use to obtain accurate conclu...
Question 45: When a new system is to be implemented within a short time f...
Question 46: Which of the following is a dynamic analysis tool for the pu...
Question 47: Which of the following statement correctly describes the dif...
Question 48: Proper segregation of duties prevents a computer operator (u...
Question 49: Which of the following is a distinctive feature of the Secur...
Question 50: Which of the following is NOT a disadvantage of Single Sign ...
Question 51: Which of the following fire suppression systems is MOST appr...
Question 52: An IS auditor reviewing an organization's data file control ...
Question 53: Which of the following should an IS auditor review to determ...
Question 54: Which of the following layer of an enterprise data flow arch...
Question 55: Which of the following is an appropriate test method to appl...
Question 56: To ensure message integrity, confidentiality and non-repudia...
Question 57: What is the recommended initial step for an IS auditor to im...
Question 58: The responsibility for authorizing access to application dat...
Question 59: The role of the certificate authority (CA) as a third party ...
Question 60: What type of risk is associated with authorized program exit...
Question 61: Which of the following should be a concern to an IS auditor ...
Question 62: Which of the following term in business continuity defines t...
Question 63: Which of the following is the PRIMARY safeguard for securing...
Question 64: In which of the following situations is it MOST appropriate ...
Question 65: Which of the following message services provides the stronge...
Question 66: An organization can ensure that the recipients of e-mails fr...
Question 67: During an audit of the logical access control of an ERP fina...
Question 68: Which of the following statement correctly describes the dif...
Question 69: An IS auditor reviewing the implementation of an intrusion d...
Question 70: An organization has been recently downsized, in light of thi...
Question 71: In order to properly protect against unauthorized disclosure...
Question 72: Which of the following antivirus software implementation str...
Question 73: Identify the LAN topology from below diagram presented below...
Question 74: Which of the following implementation modes would provide th...
Question 75: What process is used to validate a subject's identity?...
Question 76: An IS auditor notes that IDS log entries related to port sca...
Question 77: Which of the following intrusion detection systems (IDSs) mo...
Question 78: What is used to provide authentication of the website and ca...
Question 79: Which of the following append themselves to files as a prote...
Question 80: An IS auditor should recommend the use of library control so...
Question 81: A company is implementing a dynamic host configuration proto...
Question 82: During the system testing phase of an application developmen...
Question 83: During the testing of the business continuity plan (BCP), wh...
Question 84: Which of the following would BEST maintain the integrity of ...
Question 85: Which of the following is a prevalent risk in the developmen...
Question 86: Which of the following transmission media is MOST difficult ...
Question 87: Which of the following attack is also known as Time of Check...
Question 88: Which of the following intrusion detection systems (IDSs) wi...
Question 89: An organization is disposing of a number of laptop computers...
Question 90: Once an organization has finished the business process reeng...
Question 91: Who is accountable for maintaining appropriate security meas...
Question 92: What would be the MOST effective control for enforcing accou...
Question 93: Which of the following is a feature of an intrusion detectio...
Question 94: Which of the following term related to network performance r...
Question 95: An IS auditor notes that patches for the operating system us...
Question 96: A virtual private network (VPN) provides data confidentialit...
Question 97: During a postimplementation review of an enterprise resource...
Question 98: Which of the following attack best describe "Computer is the...
Question 99: Which of the following is a practice that should be incorpor...
Question 100: Which of the following exposures associated with the spoolin...
Question 101: Which of the following provides the framework for designing ...
Question 102: Which of the following statement correctly describes the dif...
Question 103: Which of the following layer of an enterprise data flow arch...
Question 104: During the requirements definition phase of a software devel...
Question 105: How does the process of systems auditing benefit from using ...
Question 106: An IS auditor reviewing digital rights management (DRM) appl...
Question 107: Digital signatures require the sender to "sign" the data by ...
Question 108: Which of the following processes should an IS auditor recomm...
Question 109: Who is mainly responsible for protecting information assets ...
Question 110: An IS auditor performing a telecommunication access control ...
Question 111: Which of the following device in Frame Relay WAN technique i...
Question 112: Which of the following would be the BEST method for ensuring...
Question 113: In a relational database with referential integrity, the use...
Question 114: Which of the following line media would provide the BEST sec...
Question 115: An IS auditor who has discovered unauthorized transactions d...
Question 116: Which of the following provides nonrepudiation services for ...
Question 117: Which of the following is the MOST reasonable option for rec...
Question 118: As compared to understanding an organization's IT process fr...
Question 119: In an online transaction processing system, data integrity i...
Question 120: IS management recently replaced its existing wired local are...
Question 121: Which of the following statement correctly describes one way...
Question 122: What protects an application purchaser's ability to fix or c...
Question 123: During a human resources (HR) audit, an IS auditor is inform...
Question 124: Which of the following layer of an enterprise data flow arch...
Question 125: When reviewing an implementation of a VoIP system over a cor...
Question 126: In an EDI process, the device which transmits and receives e...
Question 127: Which of the following is NOT a true statement about public ...
Question 128: Which of the following ACID property in DBMS requires that e...
Question 129: Which of the following term in business continuity determine...
Question 130: During a business continuity audit an IS auditor found that ...
Question 131: Which of the following is MOST critical when creating data f...
Question 132: If an IS auditor finds evidence of risk involved in not impl...
Question 133: Which of the following are effective in detecting fraud beca...
Question 134: An organization has a mix of access points that cannot be up...
Question 135: Which of the following PBX feature allows a PBX to be config...
Question 136: An IS auditor noted that an organization had adequate busine...
Question 137: There are several types of penetration tests depending upon ...
Question 138: As described at security policy, the CSO implemented an e-ma...
Question 139: Which of the following must exist to ensure the viability of...
Question 140: When reviewing system parameters, an IS auditor's PRIMARY co...
Question 141: Confidentiality of the data transmitted in a wireless LAN is...
Question 142: Which of the following layer of an enterprise data flow arch...
Question 143: Which of the following type of an IDS resides on important s...
Question 144: Which of the following acts as a decoy to detect active inte...
Question 145: An IS auditor has audited a business continuity plan (BCP). ...
Question 146: When installing an intrusion detection system (IDS), which o...
Question 147: Which of the following term describes a failure of an electr...
Question 148: Which of the following is a type of computer network used fo...
Question 149: After installing a network, an organization installed a vuln...
Question 150: Which testing approach is MOST appropriate to ensure that in...
Question 151: Which of the following methods of providing telecommunicatio...
Question 152: Test and development environments should be separated. True ...
Question 153: Which of the following term related to network performance r...
Question 154: Which of the following is the MOST effective type of antivir...
Question 155: What determines the strength of a secret key within a symmet...
Question 156: Which of the following is an advantage of the top-down appro...
Question 157: Which of the following would be BEST prevented by a raised f...
Question 158: Which of the following is a benefit of using callback device...
Question 159: By evaluating application development projects against the c...
Question 160: Which of the following cryptography demands less computation...
Question 161: When auditing a disaster recovery plan for a critical busine...
Question 162: To address an organization's disaster recovery requirements,...
Question 163: When two or more systems are integrated, input/output contro...
Question 164: In the 2c area of the diagram, there are three hubs connecte...
Question 165: An organization has a number of branches across a wide geogr...
Question 166: In addition to the backup considerations for all systems, wh...
Question 167: Which of the following concerns associated with the World Wi...
Question 168: Which of the following is the BEST audit procedure to determ...
Question 169: An existing system is being extensively enhanced by extracti...
Question 170: Which of the following is best suited for searching for addr...
Question 171: Identify the correct sequence of Business Process Reengineer...
Question 172: To detect attack attempts that the firewall is unable to rec...
Question 173: Which of the following help(s) prevent an organization's sys...
Question 174: Accountability for the maintenance of appropriate security m...
Question 175: IS management has decided to install a level 1 Redundant Arr...
Question 176: Disaster recovery planning (DRP) addresses the:...
Question 177: Which of the following controls would be MOST effective in e...
Question 178: Which of the following statement INCORRECTLY describes circu...
Question 179: The specific advantage of white box testing is that it:...
Question 180: Who is primarily responsible for storing and safeguarding th...
Question 181: For locations 3a, 1d and 3d, the diagram indicates hubs with...
Question 182: Which of the following is the MOST reliable form of single f...
Question 183: During an IS audit, one of your auditor has observed that so...
Question 184: Input/output controls should be implemented for which applic...
Question 185: Organizations should use off-site storage facilities to main...
Question 186: Users are issued security tokens to be used in combination w...
Question 187: Which of the following functions should be performed by the ...
Question 188: Which of the following is a general operating system access ...
Question 189: Which of the following is a technique that could be used to ...
Question 190: An organization's disaster recovery plan should address earl...
Question 191: Which of the following is an environmental issue caused by e...
Question 192: When should reviewing an audit client's business plan be per...
Question 193: The BEST way to minimize the risk of communication failures ...
Question 194: An advantage of a continuous audit approach is that it can i...
Question 195: Which of the following would be the MOST secure firewall sys...
Question 196: Which of the following is widely accepted as one of the crit...
Question 197: Time constraints and expanded needs have been found by an IS...
Question 198: Which of the following data validation edits is effective in...
Question 199: During a logical access controls review, an IS auditor obser...
Question 200: An IS auditor is performing a network security review of a t...
Question 201: Which of the following level in CMMI model focuses on proces...
Question 202: In which of the following database model is the data organiz...
Question 203: What method might an IS auditor utilize to test wireless sec...
Question 204: A structured walk-through test of a disaster recovery plan i...
Question 205: Which of the following testing method examines the functiona...
Question 206: Which of the following is the MOST important objective of da...
Question 207: The PRIMARY objective of business continuity and disaster re...
Question 208: Who is responsible for restricting and monitoring access of ...
Question 209: The PRIMARY goal of a web site certificate is:...
Question 210: Which of the following is a passive attack to a network?...
Question 211: The computer security incident response team (CSIRT) of an o...
Question 212: Which of the following statement INCORRECTLY describes anti-...
Question 213: The PRIMARY objective of Secure Sockets Layer (SSL) is to en...
Question 214: Which of the following would MOST effectively enhance the se...
Question 215: Which of the following procedures would MOST effectively det...
Question 216: Disaster recovery planning (DRP) for a company's computer sy...
Question 217: An efficient use of public key infrastructure (PKI) should e...
Question 218: An integrated test facility is not considered a useful audit...
Question 219: Structured programming is BEST described as a technique that...
Question 220: Why is the WAP gateway a component warranting critical conce...
Question 221: When reviewing input controls, an IS auditor observes that, ...
Question 222: The MOST important success factor in planning a penetration ...
Question 223: Which of the following term related to network performance r...
Question 224: The most common problem in the operation of an intrusion det...
Question 225: An IS auditor reviewing a database application discovers tha...
Question 226: Am advantage of the use of hot sites as a backup alternative...
Question 227: Which of the following attack involves sending forged ICMP E...
Question 228: Which of the following provides the MOST relevant informatio...
Question 229: Which of the following is the MOST critical step in planning...
Question 230: Over the long term, which of the following has the greatest ...
Question 231: To prevent IP spoofing attacks, a firewall should be configu...
Question 232: The MOST effective control for reducing the risk related to ...
Question 233: While reviewing the IT infrastructure, an IS auditor notices...
Question 234: A data center has a badge-entry system. Which of the followi...
Question 235: Vendors have released patches fixing security flaws in their...
Question 236: Security administration procedures require read-only access ...
Question 237: During which of the following phases in system development w...
Question 238: Which of the following controls would be the MOST comprehens...
Question 239: A technical lead who was working on a major project has left...
Question 240: During Involuntary termination of an employee, which of the ...
Question 241: A digital signature contains a message digest to:...
Question 242: ISO 9126 is a standard to assist in evaluating the quality o...
Question 243: Which of the following procedures would BEST determine wheth...
Question 244: If inadequate, which of the following would be the MOST like...
Question 245: Who is responsible for implementing cost-effective controls ...
Question 246: As an IS auditor it is very important to understand the impo...
Question 247: When reviewing the configuration of network devices, an IS a...
Question 248: Who is responsible for the overall direction, costs, and tim...
Question 249: When transmitting a payment instruction, which of the follow...
Question 250: An organization is implementing a new system to replace a le...
Question 251: Which of the following is of greatest concern to the IS audi...
Question 252: Which of the following attacks could capture network user pa...
Question 253: The purpose of a deadman door controlling access to a comput...
Question 254: What type of approach to the development of organizational p...
Question 255: An IS auditor doing penetration testing during an audit of i...
Question 256: Of the following alternatives, the FIRST approach to develop...
Question 257: During an audit of a telecommunications system, an IS audito...
Question 258: Batch control reconciliation is a _____________________ (fil...
Question 259: Which of the following provides the GREATEST assurance of me...
Question 260: What are trojan horse programs?...
Question 261: Private Branch Exchange(PBX) environment involves many secur...
Question 262: The MAIN criterion for determining the severity level of a s...
Question 263: Which of the following attack could be avoided by creating m...
Question 264: The BEST overall quantitative measure of the performance of ...
Question 265: In a public key infrastructure (PKI), which of the following...
Question 266: An IS auditor finds that, at certain times of the day, the d...
Question 267: What is a risk associated with attempting to control physica...
Question 268: During an application audit, an IS auditor finds several pro...
Question 269: Which of the following statement is NOT true about Voice-Ove...
Question 270: Which of the following would be of MOST concern to an IS aud...
Question 271: Which of the following statement correctly describes differe...
Question 272: IS management has decided to rewrite a legacy customer relat...
Question 273: Which of the following type of a computer network covers a l...
Question 274: A company undertakes a business process reengineering (BPR) ...
Question 275: A database administrator is responsible for:...
Question 276: An offsite information processing facility:...
Question 277: Which of the following type of lock uses a magnetic or embed...
Question 278: An IS auditor recommends that an initial validation control ...
Question 279: The purpose of code signing is to provide assurance that:...
Question 280: Which of the following statement INCORRECTLY describes netwo...
Question 281: Which of the following would BEST support 24/7 availability?...
Question 282: The MAIN reason for requiring that all computer clocks acros...
Question 283: The Secure Sockets Layer (SSL) protocol addresses the confid...
Question 284: Which of the following PBX feature provides the possibility ...
Question 285: An IS auditor reviewing access controls for a client-server ...
Question 286: Which of the following is the INCORRECT Layer to Protocol ma...
Question 287: Which of the following is an example of a passive attack ini...
Question 288: When reviewing procedures for emergency changes to programs,...
Question 289: Which of the following would prevent unauthorized changes to...
Question 290: An information security policy stating that 'the display of ...
Question 291: The logical exposure associated with the use of a checkpoint...
Question 292: Business Continuity Planning (BCP) is not defined as a prepa...
Question 293: E-mail message authenticity and confidentiality is BEST achi...
Question 294: A live test of a mutual agreement for IT system recovery has...
Question 295: Which of the following attack occurs when a malicious action...
Question 296: The technique used to ensure security in virtual private net...
Question 297: Which of the following presents an inherent risk with no dis...
Question 298: Distributed denial-of-service (DDOS) attacks on Internet sit...
Question 299: A PRIMARY benefit derived from an organization employing con...
Question 300: Which of the following transmission media is LEAST vulnerabl...
Question 301: An IS auditor reviewing an accounts payable system discovers...
Question 302: Rather than simply reviewing the adequacy of access control,...
Question 303: When developing a disaster recovery plan, the criteria for d...
Question 304: When planning an audit of a network setup, an IS auditor sho...
Question 305: A lower recovery time objective (RTO) results in:...
Question 306: Which of the following service is a distributed database tha...
Question 307: Which of the following provides the BEST single-factor authe...
Question 308: During the review of a biometrics system operation, an IS au...
Question 309: Which of the following ensures a sender's authenticity and a...
Question 310: A disaster recovery plan for an organization should:...
Question 311: Which of the following layer of an OSI model responsible for...
Question 312: What should be the GREATEST concern to an IS auditor when em...
Question 313: Which of the following satisfies a two-factor user authentic...
Question 314: When evaluating the controls of an EDI application, an IS au...
Question 315: An IS auditor inspected a windowless room containing phone s...
Question 316: Digital signatures require the:...
Question 317: When performing an IS strategy audit, an IS auditor should r...
Question 318: Which of the following components is responsible for the col...
Question 319: Which of the following uses a prototype that can be updated ...
Question 320: The GREATEST advantage of rapid application development (RAD...
Question 321: Which of the following types of transmission media provide t...
Question 322: Which of the following statement correctly describes differe...
Question 323: An IS auditor observes a weakness in the tape management sys...
Question 324: When should application controls be considered within the sy...
Question 325: Which of the following tasks should be performed FIRST when ...
Question 326: An organization is using an enterprise resource management (...
Question 327: Which of the following network configuration options contain...
Question 328: Which of the following protocol is PRIMARILY used to provide...
Question 329: Which of the following is a control over component communica...
Question 330: IS management is considering a Voice-over Internet Protocol ...
Question 331: Which of the following systems or tools can recognize that a...
Question 332: In a contract with a hot, warm or cold site, contractual pro...
Question 333: A review of wide area network (WAN) usage discovers that tra...
Question 334: Which of the following is a network diagnostic tool that mon...
Question 335: Identify the correct sequence of Business Process Reengineer...
Question 336: Which of the following is the MOST effective control when gr...
Question 337: Which of the following biometrics methods provides the HIGHE...
Question 338: What type of risk results when an IS auditor uses an inadequ...
Question 339: An organization is using symmetric encryption. Which of the ...
Question 340: Which of the following layer from an enterprise data flow ar...
Question 341: A hot site should be implemented as a recovery strategy when...
Question 342: Proper segregation of duties prohibits a system analyst from...
Question 343: Which of the following can degrade network performance?...
Question 344: Which of the following internet security threats could compr...
Question 345: The difference between a vulnerability assessment and a pene...
Question 346: A company has implemented a new client-server enterprise res...
Question 347: An IS auditor examining the configuration of an operating sy...
Question 348: Which of the following type of computer is a large, general ...
Question 349: Which of the following would impair the independence of a qu...
Question 350: Which of the following represents the GREATEST potential ris...
Question 351: An IS auditor performing an independent classification of sy...
Question 352: Which of the following statement correctly describes the dif...
Question 353: The feature of a digital signature that ensures the sender c...
Question 354: To ensure authentication, confidentiality and integrity of a...
Question 355: In a client-server architecture, a domain name service (DNS)...
Question 356: Identify the correct sequence which needs to be followed as ...
Question 357: An advantage in using a bottom-up vs. a top-down approach to...
Question 358: An organization has recently installed a security patch, whi...
Question 359: The MOST effective biometric control system is the one:...
Question 360: What is often assured through table link verification and re...
Question 361: Sending a message and a message hash encrypted by the sender...
Question 362: Management considered two projections for its business conti...
Question 363: Which of the following is the BEST method for preventing the...
Question 364: When reviewing a hardware maintenance program, an IS auditor...
Question 365: Which of the following is the MOST important action in recov...
Question 366: Regarding a disaster recovery plan, the role of an IS audito...
Question 367: Which of the following protocol uses serial interface for co...
Question 368: Which of the following attack is MOSTLY performed by an atta...
Question 369: What can be implemented to provide the highest level of prot...
Question 370: Which of the following layer of an enterprise data flow arch...
Question 371: A number of system failures are occurring when corrections t...
Question 372: Which of the following statements regarding an off-site info...
Question 373: Which of the following BEST limits the impact of server fail...
Question 374: The objective of concurrency control in a database system is...
Question 375: An IS auditor performing an application maintenance audit wo...
Question 376: Which of the following physical access controls effectively ...
Question 377: A firm is considering using biometric fingerprint identifica...
Question 378: Which of the following is of greatest concern when performin...
Question 379: Which of the following controls would provide the GREATEST a...
Question 380: Which of the following is protocol data unit (PDU) of data a...
Question 381: Which of the following is the dominating objective of BCP an...
Question 382: Which of the following layer of an OSI model controls dialog...
Question 383: Which of the following is a project management technique for...
Question 384: The MOST likely explanation for a successful social engineer...
Question 385: Which of the following BEST reduces the ability of one devic...
Question 386: The MOST important difference between hashing and encryption...
Question 387: If a database is restored from information backed up before ...
Question 388: The GREATEST benefit in implementing an expert system is the...
Question 389: An organization provides information to its supply chain par...
Question 390: Which of the following layer of an enterprise data flow arch...
Question 391: The PRIMARY purpose of audit trails is to:...
Question 392: Which of the following would be the MOST significant audit f...
Question 393: Which of the following Confidentiality, Integrity, Availabil...
Question 394: Which of the following statement INCORRECTLY describes packe...
Question 395: As an IS auditor it is very important to understand software...
Question 396: Which of the following would an IS auditor consider to be th...
Question 397: When developing a business continuity plan (BCP), which of t...
Question 398: E-mail traffic from the Internet is routed via firewall-1 to...
Question 399: Which of the following cryptography is based on practical ap...
Question 400: Which of the following statement INCORRECTLY describes Async...
Question 401: After discovering a security vulnerability in a third-party ...
Question 402: Which of the following would be the BEST overall control for...
Question 403: An IS auditor should carefully review the functional require...
Question 404: An offsite information processing facility with electrical w...
Question 405: Which of the following method is recommended by security pro...
Question 406: Which of the following is a sophisticated computer based swi...
Question 407: Which of the following would help to ensure the portability ...
Question 408: The MAJOR advantage of a component-based development approac...
Question 409: Which of the following is a software application that preten...
Question 410: An IS auditor performing a review of the backup processing f...
Question 411: Using the OSI reference model, what layer(s) is/are used to ...
Question 412: Which of the following type of lock uses a numeric keypad or...
Question 413: Which of the following biometrics has the highest reliabilit...
Question 414: As an IS auditor it is very important to understand software...
Question 415: To determine which users can gain access to the privileged s...
Question 416: An IS auditor reviewing the key roles and responsibilities o...
Question 417: An IS auditor finds that a DBA has read and write access to ...
Question 418: Which of the following is the MOST important criterion when ...
Question 419: Which of the following is a ITU-T standard protocol suite fo...
Question 420: Which of the following protocol is developed jointly by VISA...
Question 421: Which of the following layer of an OSI model ensures that me...
Question 422: Which of the following is the BEST way to handle obsolete ma...
Question 423: Ensuring that security and control policies support business...
Question 424: To ensure compliance with a security policy requiring that p...
Question 425: COBIT 5 separates information goals into three sub-dimension...
Question 426: An organization has implemented a disaster recovery plan. Wh...
Question 427: Identify the WAN message switching technique being used from...
Question 428: Which of the following provide(s) near-immediate recoverabil...
Question 429: Which of the following is the MOST critical and contributes ...
Question 430: An off-site processing facility should be easily identifiabl...
Question 431: When conducting a penetration test of an organization's inte...
Question 432: Off-site data backup and storage should be geographically se...
Question 433: Which of the following is the BEST type of program for an or...
Question 434: In computer forensic which of the following describe the pro...
Question 435: Which of the following devices extends the network and has t...
Question 436: Applying a retention date on a file will ensure that:...
Question 437: An organization is considering connecting a critical PC-base...
Question 438: A penetration test performed as part of evaluating network s...
Question 439: Which of the following software development methods is based...
Question 440: The PRIMARY objective of service-level management (SLM) is t...
Question 441: The PRIMARY purpose of a business impact analysis (BIA) is t...
Question 442: To develop a successful business continuity plan, end user i...
Question 443: Which of the following provides the BEST evidence of an orga...
Question 444: Which of the following is the MOST robust method for disposi...
Question 445: Functionality is a characteristic associated with evaluating...
Question 446: When reviewing print systems spooling, an IS auditor is MOST...
Question 447: Which of the following protocol does NOT work at the Applica...
Question 448: An IS auditor evaluating the resilience of a high-availabili...
Question 449: Which of the following testing method examines internal stru...
Question 450: In transport mode, the use of the Encapsulating Security Pay...
Question 451: Which of the following would effectively verify the originat...
Question 452: Which of the following comparisons are used for identificati...
Question 453: An IS auditor analyzing the audit log of a database manageme...
Question 454: What can be used to gather evidence of network attacks?...
Question 455: What is a callback system?
Question 456: Network Data Management Protocol (NDMP) technology should be...
Question 457: During the development of an application, the quality assura...
Question 458: In auditing a web server, an IS auditor should be concerned ...
Question 459: Most access violations are:
Question 460: Which of the following is the INCORRECT "layer - protocol" m...
Question 461: As an auditor it is very important to ensure confidentiality...
Question 462: An IS auditor examining a biometric user authentication syst...
Question 463: Which of the following is the MOST important consideration w...
Question 464: The information security policy that states 'each individual...
Question 465: An IS auditor performing detailed network assessments and ac...
Question 466: A financial institution that processes millions of transacti...
Question 467: Which of the following technique is used for speeding up net...
Question 468: Which of the following exposures could be caused by a line g...
Question 469: If a database is restored using before-image dumps, where sh...
Question 470: Which of the following system and data conversion strategies...
Question 471: Which significant risk is introduced by running the file tra...
Question 472: As an IS auditor, it is very important to make sure all stor...
Question 473: During an audit, an IS auditor notes that an organization's ...
Question 474: As updates to an online order entry system are processed, th...
Question 475: The use of statistical sampling procedures helps minimize:...
Question 476: Which of the following type of a computer network is a WAN t...
Question 477: Which of the following would provide the BEST protection aga...
Question 478: An IS auditor is reviewing a software-based configuration. W...
Question 479: Which of the following is a standard secure email protection...
Question 480: Which of the following is an advantage of asymmetric crypto ...
Question 481: Which of the following disaster recovery/continuity plan com...
Question 482: The PRIMARY objective of performing a postincident review is...
Question 483: Who is ultimately responsible for providing requirement spec...
Question 484: Which of the following is NOT a component of IPSec?...
Question 485: A data administrator is responsible for:...
Question 486: Which of the following types of firewalls provide the GREATE...
Question 487: When should systems administrators first assess the impact o...
Question 488: Which of the following protocol is used for electronic mail ...
Question 489: Which of the following should be the MOST important criterio...
Question 490: Which of the following level in CMMI model focuses on proces...
Question 491: A core tenant of an IS strategy is that it must:...
Question 492: In RFID technology which of the following risk could represe...
Question 493: In which of the following transmission media it is MOST diff...
Question 494: The GREATEST advantage of using web services for the exchang...
Question 495: Which of the following is a passive attack method used by in...
Question 496: Which of the following would an IS auditor consider a weakne...
Question 497: What is the most common reason for information systems to fa...
Question 498: The FIRST step in managing the risk of a cyber-attack is to:...
Question 499: Which of the following encryption techniques will BEST prote...
Question 500: The FIRST step in data classification is to:...
Question 501: Why does an IS auditor review an organization chart?...
Question 502: Which of the following term related to network performance r...
Question 503: What is/are used to measure and ensure proper network capaci...
Question 504: An offsite information processing facility having electrical...
Question 505: Which of the following antispam filtering techniques would B...
Question 506: When performing a database review, an IS auditor notices tha...
Question 507: Which of the following ACID property in DBMS ensures that th...
Question 508: Which of the following is the BEST method for determining th...
Question 509: Passwords should be:
Question 510: When using a digital signature, the message digest is comput...
Question 511: When reviewing an intrusion detection system (IDS), an IS au...
Question 512: In regard to moving an application program from the test env...
Question 513: When using an integrated test facility (ITF), an IS auditor ...
Question 514: Which of the following INCORRECTLY describes the layer funct...
Question 515: Which of the following database model allow many-to-many rel...
Question 516: Which of the following is an estimation technique where the ...
Question 517: What should an organization do before providing an external ...
Question 518: After a full operational contingency test, an IS auditor per...
Question 519: At the end of the testing phase of software development, an ...
Question 520: Which of the following is the MOST effective method for deal...
Question 521: Which of the following ensures the availability of transacti...
Question 522: An IS auditor should review the configuration of which of th...
Question 523: An IS auditor should be MOST concerned with what aspect of a...
Question 524: Which policy helps an auditor to gain a better understanding...
Question 525: Which of the following transmission media uses a transponder...
Question 526: To determine if unauthorized changes have been made to produ...
Question 527: Who is responsible for authorizing access level of a data us...
Question 528: When auditing security for a data center, an IS auditor shou...
Question 529: John has been hired to fill a new position in one of the wel...
Question 530: Which of the following should be included in a feasibility s...
Question 531: When using public key encryption to secure data being transm...
Question 532: Parity bits are a control used to validate:...
Question 533: The PRIMARY reason for using digital signatures is to ensure...
Question 534: Which of the following is protocol data unit (PDU) of transp...
Question 535: The purpose of business continuity planning and disaster-rec...
Question 536: Which of the following would prevent accountability for an a...
Question 537: After implementation of a disaster recovery plan, pre-disast...
Question 538: What kind of testing should programmers perform following an...
Question 539: Which of the following term in business continuity determine...
Question 540: When using a universal storage bus (USB) flash drive to tran...
Question 541: Which of the following software development methodology uses...
Question 542: When performing an audit of access rights, an IS auditor sho...
Question 543: During maintenance of a relational database, several values ...
Question 544: Which of the following PBX feature supports shared extension...
Question 545: During the audit of a database server, which of the followin...
Question 546: Which of the following attack includes social engineering, l...
Question 547: Within IPSEC which of the following defines security paramet...
Question 548: Which of the following BEST ensures the integrity of a serve...
Question 549: While reviewing the business continuity plan of an organizat...
Question 550: Which of the following protocol does NOT work at Network int...
Question 551: What supports data transmission through split cable faciliti...
Question 552: When performing an audit of a client relationship management...
Question 553: Which of the following type of network service maps Domain N...
Question 554: What are intrusion-detection systems (IDS) primarily used fo...
Question 555: Which of the following controls would BEST detect intrusion?...
Question 556: Which of the following protocols would be involved in the im...
Question 557: Which of the following would MOST effectively control the us...
Question 558: Which of the following functionality is NOT performed by the...
Question 559: Applying a digital signature to data traveling in a network ...
Question 560: The application systems of an organization using open-source...
Question 561: In a small organization, an employee performs computer opera...
Question 562: What uses questionnaires to lead the user through a series o...
Question 563: Which of the following recovery strategies is MOST appropria...
Question 564: While designing the business continuity plan (BCP) for an ai...
Question 565: The IS management of a multinational company is considering ...
Question 566: Which of the following statement is NOT true about smoke det...
Question 567: The most likely error to occur when implementing a firewall ...
Question 568: Which of the following is the GREATEST concern when an organ...
Question 569: Which of the following public key infrastructure (PKI) eleme...
Question 570: Validated digital signatures in an e-mail software applicati...
Question 571: Reconfiguring which of the following firewall types will pre...
Question 572: Which of the following attack involves slicing small amount ...
Question 573: An auditor needs to be aware of technical controls which are...
Question 574: Which of the following term in business continuity determine...
Question 575: How often should a Business Continuity Plan be reviewed?...
Question 576: The traditional role of an IS auditor in a control self-asse...
Question 577: Doing which of the following during peak production hours co...
Question 578: An IS auditor has completed a network audit. Which of the fo...
Question 579: In which of the following RFID risks competitor potentially ...
Question 580: Which of the following type of IDS has self-learning functio...
Question 581: To provide protection for media backup stored at an offsite ...
Question 582: Which of the following types of firewalls would BEST protect...
Question 583: From a control perspective, the PRIMARY objective of classif...
Question 584: A call-back system requires that a user with an id and passw...
Question 585: What is the MOST effective method of preventing unauthorized...
Question 586: How can minimizing single points of failure or vulnerabiliti...
Question 587: A business application system accesses a corporate database ...
Question 588: During what process should router access control lists be re...
Question 589: The use of residual biometric information to gain unauthoriz...
Question 590: An IS auditor is reviewing the remote access methods of a co...
Question 591: The goal of an information system is to achieve integrity, a...
Question 592: The MOST significant level of effort for business continuity...
Question 593: Which of the following functionality is NOT supported by SSL...
Question 594: Which of the following is MOST directly affected by network ...
Question 595: Which of the following type of computer has highest processi...
Question 596: Due to changes in IT, the disaster recovery plan of a large ...
Question 597: Off-site data storage should be kept synchronized when prepa...
Question 598: Above almost all other concerns, what often results in the g...
Question 599: Which of the following device in Frame Relay WAN technique i...
Question 600: An installed Ethernet cable run in an unshielded twisted pai...
Question 601: Online banking transactions are being posted to the database...
Question 602: The MAIN purpose for periodically testing offsite facilities...
Question 603: The PRIMARY purpose of implementing Redundant Array of Inexp...
Question 604: Which of the following process consist of identification and...
Question 605: Which of the following would be the BEST access control proc...
Question 606: Which of the following is an example of the defense in-depth...
Question 607: An IS auditor conducting an access control review in a clien...
Question 608: The reliability of an application system's audit trail may b...
Question 609: The use of object-oriented design and development techniques...
Question 610: Which of the following layer of an enterprise data flow arch...
Question 611: To determine how data are accessed across different platform...
Question 612: Which of the following method should be recommended by secur...
Question 613: If a programmer has update access to a live system, IS audit...
Question 614: Which of the following type of a computer network are variat...
Question 615: Which of the following types of data validation editing chec...
Question 616: Which of the following is the INCORRECT "layer - protocol da...
Question 617: After reviewing its business processes, a large organization...
Question 618: Authentication techniques for sending and receiving data bet...
Question 619: Which of the following is the most fundamental step in preve...
Question 620: Which of the following is an implementation risk within the ...
Question 621: To verify that the correct version of a data file was used f...
Question 622: Normally, it would be essential to involve which of the foll...
Question 623: Identify the INCORRECT statement related to network performa...
Question 624: A certificate authority (CA) can delegate the processes of:...
Question 625: A disaster recovery plan for an organization's financial sys...
Question 626: Who is responsible for providing adequate physical and logic...
Question 627: In what way is a common gateway interface (CGI) MOST often u...
Question 628: A database administrator has detected a performance problem ...
Question 629: Which of the following type of a computer network covers a b...
Question 630: Naming conventions for system resources are important for ac...
Question 631: Which of the following technique is NOT used by a preacher a...
Question 632: Which of the following is protocol data unit (PDU) of networ...
Question 633: Which of the following backup techniques is the MOST appropr...
Question 634: There are many types of audit logs analysis tools available ...
Question 635: Upon receipt of the initial signed digital certificate the u...
Question 636: The waterfall life cycle model of software development is mo...
Question 637: Diskless workstation is an example of:...
Question 638: Which of the following is the BEST practice to ensure that a...
Question 639: Which of the following INCORRECTLY describes the layer funct...
Question 640: An accuracy measure for a biometric system is:...
Question 641: The database administrator (DBA) suggests that DB efficiency...
Question 642: Which of the following should be of PRIMARY concern to an IS...
Question 643: What is the BEST backup strategy for a large database with d...
Question 644: An organization has outsourced its help desk. Which of the f...
Question 645: Which of the following should be of MOST concern to an IS au...
Question 646: Which of the following manages the digital certificate life ...
Question 647: Which of the following is a concern when data are transmitte...
Question 648: Which of the following property of the core date warehouse l...
Question 649: The potential for unauthorized system access by way of termi...
Question 650: Which of the following is a feature of Wi-Fi Protected Acces...
Question 651: An IS auditor finds that client requests were processed mult...
Question 652: An IS auditor has identified the lack of an authorization pr...
Question 653: Which of the following cryptographic systems is MOST appropr...
Question 654: A company uses a bank to process its weekly payroll. Time sh...
Question 655: Who is ultimately accountable for the development of an IS s...
Question 656: IT operations for a large organization have been outsourced....
Question 657: A clerk changed the interest rate for a loan on a master fil...
Question 658: Allowing application programmers to directly patch or change...
Question 659: Which of the following ACID property in DBMS means that once...
Question 660: During a disaster recovery test, an IS auditor observes that...
Question 661: In which of the following WAN message transmission technique...
Question 662: Electromagnetic emissions from a terminal represent an expos...
Question 663: Which of the following malware technical fool's malware by a...
Question 664: The cost of ongoing operations when a disaster recovery plan...
Question 665: While evaluating logical access control the IS auditor shoul...
Question 666: Depending on the complexity of an organization's business co...
Question 667: Which of the following term related to network performance r...
Question 668: Two-factor authentication can be circumvented through which ...
Question 669: When reviewing an organization's approved software product l...
Question 670: Which of the following attack redirects outgoing message fro...
Question 671: Which of the following functions is performed by a virtual p...
Question 672: The frequent updating of which of the following is key to th...
Question 673: Which of the following ensures confidentiality of informatio...
Question 674: Which of the following network components is PRIMARILY set u...
Question 675: Sign-on procedures include the creation of a unique user ID ...
Question 676: Which of the following type of network service stores inform...
Question 677: To determine who has been given permission to use a particul...
Question 678: Which of the following statements pertaining to IPSec is inc...
Question 679: Identify the network topology from below diagram presented b...
Question 680: Which of the following is a form of Hybrid Cryptography wher...
Question 681: An organization currently using tape backups takes one full ...
Question 682: Minimum password length and password complexity verification...
Question 683: Which of the following reports should an IS auditor use to c...
Question 684: Business units are concerned about the performance of a newl...
Question 685: In the event of a data center disaster, which of the followi...
Question 686: There are many firewall implementations provided by firewall...
Question 687: Which of the following would be an indicator of the effectiv...
Question 688: Reverse proxy technology for web servers should be deployed ...
Question 689: An IS auditor should expect the responsibility for authorizi...
Question 690: When auditing third-party service providers, an IS auditor s...
Question 691: Which of the following results in a denial-of-service attack...
Question 692: In which of the following WAN message transmission technique...
Question 693: Web and e-mail filtering tools are PRIMARILY valuable to an ...
Question 694: When reviewing the procedures for the disposal of computers,...
Question 695: An organization has a recovery time objective (RTO) equal to...
Question 696: Proper segregation of duties normally does not prohibit a LA...
Question 697: Which of the following will prevent dangling tuples in a dat...
Question 698: Which of the following encrypt/decrypt steps provides the GR...
Question 699: Following best practices, formal plans for implementation of...
Question 700: If the recovery time objective (RTO) increases:...
Question 701: During an IS audit, auditor has observed that authentication...
Question 702: During an audit of an enterprise that is dedicated to e-comm...
Question 703: A sequence of bits appended to a digital document that is us...
Question 704: Which of the following is the MOST secure and economical met...
Question 705: Which of the following would contribute MOST to an effective...
Question 706: Who should be responsible for network security operations?...
Question 707: What is an effective control for granting temporary access t...
Question 708: Why is a clause for requiring source code escrow in an appli...
Question 709: An IS auditor needs to consider many factors while evaluatin...
Question 710: Which of the following term in business continuity defines t...
Question 711: Which of the following types of testing would determine whet...
Question 712: Which of the following would be the MOST cost-effective reco...
Question 713: An IS auditor conducting a review of disaster recovery plann...
Question 714: Which of the following type of honey pot essentially gives a...
Question 715: The responsibility for authorizing access to a business appl...
Question 716: As part of the business continuity planning process, which o...
Question 717: Identify the network topology from below diagram presented b...
Question 718: An IS auditor reviewing database controls discovered that ch...
Question 719: Neural networks are effective in detecting fraud because the...
Question 720: Which of the following aspects of symmetric key encryption i...
Question 721: In a public key infrastructure, a registration authority:...
Question 722: In a small organization, developers may release emergency ch...
Question 723: Which of the following methods of suppressing a fire in a da...
Question 724: Which key is used by the sender of a message to create a dig...
Question 725: To properly evaluate the collective effect of preventative, ...
Question 726: The security level of a private key system depends on the nu...
Question 727: Active radio frequency ID (RFID) tags are subject to which o...
Question 728: Which of the following applet intrusion issues poses the GRE...
Question 729: The GREATEST risk posed by an improperly implemented intrusi...
Question 730: During the review of a web-based software development projec...
Question 731: Which of the following would an IS auditor consider to be th...
Question 732: Which of the following layer in in an enterprise data flow a...
Question 733: Which of the following software development methodology is a...
Question 734: Which of the following layer of the OSI model provides a sta...
Question 735: A perpetrator looking to gain access to and gather informati...
Question 736: Which of the following BEST restricts users to those functio...
Question 737: Java applets and ActiveX controls are distributed executable...
Question 738: Which of the following is the unique identifier within and I...
Question 739: Which of the following should an IS auditor recommend for th...
Question 740: The reason a certification and accreditation process is perf...
Question 741: Which of the following is the protocol data unit (PDU) of ap...
Question 742: An IS auditor reviewing wireless network security determines...
Question 743: In a client-server system, which of the following control te...
Question 744: After identifying potential security vulnerabilities, what s...
Question 745: A programmer maliciously modified a production program to ch...
Question 746: The MOST significant security concerns when using flash memo...
Question 747: When reviewing a digital certificate verification process, w...
Question 748: An IS auditor reviewing a proposed application software acqu...
Question 749: Which of the following will help detect changes made by an i...
Question 750: A TCP/IP-based environment is exposed to the Internet. Which...
Question 751: After completing the business impact analysis (BIA), what is...
Question 752: When reviewing the implementation of a LAN, an IS auditor sh...
Question 753: A hard disk containing confidential data was damaged beyond ...
Question 754: Receiving an EDI transaction and passing it through the comm...
Question 755: To prevent unauthorized entry to the data maintained in a di...
Question 756: Which are the two primary types of scanner used for protecti...
Question 757: A benefit of quality of service (QoS) is that the:...
Question 758: An IS auditor is reviewing a project that is using an Agile ...
Question 759: The MOST likely explanation for the use of applets in an Int...
Question 760: An IS auditor should know information about different networ...
Question 761: Inadequate programming and coding practices introduce the ri...
Question 762: Disabling which of the following would make wireless local a...
Question 763: Which of the following issues should be the GREATEST concern...
Question 764: What is a common vulnerability, allowing denial-of-service a...
Question 765: An IS auditor finds that user acceptance testing of a new sy...
Question 766: With the help of a security officer, granting access to data...
Question 767: Which of the following ACID property ensures that transactio...
Question 768: Which of the following option INCORRECTLY describes PBX feat...
Question 769: The MOST effective control for addressing the risk of piggyb...
Question 770: An IS auditor is reviewing the physical security measures of...
Question 771: Which of the following statement INCORRECTLY describes devic...
Question 772: An investment advisor e-mails periodic newsletters to client...
Question 773: Which of the following findings should an IS auditor be MOST...
Question 774: Which of the following fire-suppression methods is considere...
Question 775: An internet-based attack using password sniffing can:...
Question 776: Which of the following is penetration test where the penetra...
Question 777: Which of the following layer of an OSI model encapsulates pa...
Question 778: For a discretionary access control to be effective, it must:...
Question 779: An IS auditor conducting a review of disaster recovery plann...
Question 780: Mitigating the risk and impact of a disaster or business int...
Question 781: Which of the following is the GREATEST risk when storage gro...
Question 782: From a risk management point of view, the BEST approach when...
Question 783: An organization has created a policy that defines the types ...
Question 784: What should an IS auditor do if he or she observes that proj...
Question 785: In large corporate networks having supply partners across th...
Question 786: Which of the following controls will MOST effectively detect...
Question 787: An organization has contracted with a vendor for a turnkey s...
Question 788: What type of fire-suppression system suppresses fire via wat...
Question 789: An organization is migrating from a legacy system to an ente...
Question 790: The directory system of a database-management system describ...
Question 791: An organization with extremely high security requirements is...
Question 792: In computer forensics, which of the following is the process...
Question 793: Which of the following layer of an OSI model transmits and r...
Question 794: How do modems (modulation/demodulation) function to facilita...
Question 795: The implementation of access controls FIRST requires:...
Question 796: Which of the following is MOST likely to result from a busin...
Question 797: IT best practices for the availability and continuity of IT ...
Question 798: When auditing a proxy-based firewall, an IS auditor should:...
Question 799: When reviewing an organization's logical access security, wh...
Question 800: Which of the following tests is an IS auditor performing whe...
Question 801: A hacker could obtain passwords without the use of computer ...
Question 802: How is the risk of improper file access affected upon implem...
Question 803: During the requirements definition phase for a database appl...