Question 206

Simon had all his systems administrators implement hardware and software firewalls to ensure network security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker group was able to get into the network and modify files hosted on the company's website. After searching through the firewall and server logs, no one could find how the attackers were able to get in. He decides that the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts administrators when a critical file is altered. What tool could Simon and his administrators implement to accomplish this?
  • Question 207

    Your company has limited resources to spend on security initiatives. The Chief Financial Officer asks you to prioritize the protection of information resources based on their value to the company. It is essential that you be able to communicate in language that your fellow executives will understand.
    You should:
  • Question 208

    Which of the following intellectual Property components is focused on maintaining brand recognition?
  • Question 209

    Which of the following is considered the MOST effective tool against social engineering?
  • Question 210

    Which of the following reports should you as an IT auditor use to check on compliance with a service level agreement's requirement for uptime?