An IS auditor is assigned to help design the data security aspects of an application under development. Which of the following provides the MOST reasonable assurance that corporate assets are protected when the application is certified for production? A. A review conducted by the internal auditor B. A review conducted by the assigned IS auditor C. Specifications by the user on the depth and content of the review D. An independent review conducted by another equally experienced IS auditor
1 6997Which of the following Internet security threats could compromise integrity? A. Theft of data from the client B. Exposure of network configuration information C. A trojan horse browser D. Eavesdropping on the net
2 7707Accountability for the maintenance of appropriate security measures over information assets resides with the: A. security administrator. B. systems administrator. C. data and systems owners. D. systems operations group.
2 9117The development of an IS security policy is ultimately the responsibility of the: A. IS department. B. security committee. C. security administrator. D. board of directors.
1 8556Security administration procedures require read-only access to: A. access control tables. B. security log files. C. logging options. D. user profiles.
1 12844The security level of a private key system depends on the number of: A. encryption key bits. B. messages sent. C. keys. D. channels used.
1 9610An enterprisewide network security architecture of public key infrastructure (PKI) would be comprised of: A. A public key cryptosystem, private key cryptosystem and digital certificate B. A public key cryptosystem, symmetric encryption and certificate authorities C. A symmetric encryption, digital certificate and kerberos authentication D. A public key cryptosystem, digital certificate and certificate authorities
1 6919When an information security policy has been designed, it is MOST important that the information security policy be: A. stored offsite. B. written by IS management. C. circulated to users. D. updated frequently.
1 5456When reviewing an organization's logical access security, which of the following would be of the MOST concern to an IS auditor? A. Passwords are not shared. B. Password files are encrypted. C. Redundant logon IDs are deleted. D. The allocation of logon IDs is controlled.
1 10645The MOST important responsibility of a data security officer in an organization is: A. recommending and monitoring data security policies. B. promoting security awareness within the organization. C. establishing procedures for IT security policies. D. administering physical and logical access controls.
1 9847When conducting an audit of client/server database security, the IS auditor would be MOST concerned about the availability of: A. system utilities. B. application program generators. C. system security documentation. D. access to stored procedures.
2 8615Which of the following concerns about the security of an electronic message would be addressed by digital signatures? A. Unauthorized reading B. Theft C. Unauthorized copying D. Alteration
1 8406
What are the restrictions imposed by a Security Manager on Applets?.
For protecting a transaction using the transaction security function, the two things that must be done are?
What r all the security problems u r facing & the measures taken to solve.
What do you think poses the greatest threat to Airline security today?
What Security Precautions Should Be Taken At Public Hotspots?
How can you test the security of a Web site,both manually and by using a tool?
What is the difference in Login Security Modes between v6.5 and 7.0?
What can be proven about the security of a product cipher?
Actual role of cryptography is data security .Explain with real world example?
Why is wireless security important?
Compare CORBA security with security of other distributed object computing frameworks such as Java RMI or DCOM?
What are the shortcomings of CORBA Security service?
How to come up with application security design using CORBA Security service?
How to implement the CORBA security service?
What would be the most suitable ORB products when buliding a small lab for evaluating, testing and implementing security functions in a CORBA system?