Question 76

Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
  • Question 77

    In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
  • Question 78

    Which of the following Is the MOST effective way for an IS auditor to evaluate whether an organization is well positioned to defend against an advanced persistent threat (APT)?
  • Question 79

    A database audit reveals an issue with the way data ownership for client data is defined. Which of the following roles should be accountable for this finding?
  • Question 80

    A post-implementation review of a development project concludes that several business requirements were not reflected in the software requirement specifications. Which of the following should an IS auditor recommend to reduce this problem in the future?