Question: 1
A company is implementing a dynamic host configuration protocol (DHCP). Given that the following conditions exist, which represents the GREATEST concern?
Question: 2
An IS auditor is performing a network security review of a telecom company that provides Internet connection services to shopping malls for their wireless customers. The company uses Wireless Transport Layer Security (WTLS) and Secure Sockets Layer (SSL) technology for protecting their customer's payment information. The IS auditor should be MOST concerned if a hacker:
Question: 3
Which of the following BEST reduces the ability of one device to capture the packets that are meant for another device?
Question: 4
In a client-server system, which of the following control techniques is used to inspect activity from known or unknown users?
Question: 5
When reviewing system parameters, an IS auditor's PRIMARY concern should be that: