Question { 3174 }
To detect attack attempts that the firewall is unable to recognize, an IS auditor should recommend placing a network intrusion detection system (IDS) between the:
Answer
Is This Answer Correct ? | 1 Yes | 1 No |
Question { 6263 }
During the course of an audit, the IS auditor discovers that the human resources (HR) department uses a cloud-based application to manage employee records. The HR department engaged in a contract outside of the normal vendor management process and manages the application on its own. Which of the following choices is of MOST concern?
A. Maximum acceptable downtime metrics have not been defined in the contract.
B. The IT department does not manage the relationship with the cloud vendor.
C. The help desk call center is in a different country, with different privacy requirements.
D. Company-defined security policies are not applied to the cloud application.
Answer
Is This Answer Correct ? | 5 Yes | 2 No |
Question { 6949 }
Which of the following choices BEST ensures the effectiveness of controls related to interest calculation inside an accounting system?
A.
Re-performance
B.
Process walk-through
C.
Observation
D.
Documentation review
Answer
Is This Answer Correct ? | 8 Yes | 0 No |