Question: 1
For a discretionary access control to be effective, it must:
Question: 2
An IS auditor examining a biometric user authentication system establishes the existence of a control weakness that would allow an unauthorized individual to update the centralized database on the server that is used to store biometric templates. Ofthe following, which is the BEST control against this risk?
Question: 3
From a control perspective, the PRIMARY objective of classifying information assets is to:
Question: 4
An organization has been recently downsized, in light of this, an IS auditor decides to test logical access controls. The IS auditor's PRIMARY concern should be that:
Question: 5
The logical exposure associated with the use of a checkpoint restart procedure is: