MultipleChoice
What is the GREATEST concern tor an IS auditor reviewing contracts for licensed software that executes a critical business process?
OptionsMultipleChoice
On a public-key cryptosystem when there is no previous knowledge between parties, which of the following will BEST help to prevent one person from using a fictitious key to impersonate someone else?
OptionsMultipleChoice
Which of the following should be seen as one of the most significant factors considered when determining the frequency of IS audits within your organization?
OptionsMultipleChoice
Properly planned risk-based audit programs are often capable of offering which of the following benefits?
OptionsMultipleChoice
The sophistication and formality of IS audit programs may vary significantly depending on which of the following factors?
OptionsMultipleChoice
Which of the following is one most common way that spyware is distributed?
OptionsMultipleChoice
Which of the following is not a good tactic to use against hackers?
OptionsMultipleChoice
Creating which of the following is how a hacker can insure his ability to return to the hacked system at will?
OptionsMultipleChoice
A trojan horse simply cannot operate autonomously.
OptionsMultipleChoice
Which of the following refers to the collection of policies and procedures for implementing controls capable of restricting access to computer software and data files?
Options