Question 131

When developing a risk-based audit strategy, an IS auditor should conduct a risk assessment to ensure that:
  • Question 132

    What is the BEST backup strategy for a large database with data supporting online sales?
  • Question 133

    Which of the following is the MOST important consideration when establishing vulnerability scanning on critical IT infrastructure?
  • Question 134

    During an IS audit, auditor has observed that authentication and authorization steps are split into two
    functions and there is a possibility to force the authorization step to be completed before the authentication
    step. Which of the following technique an attacker could user to force authorization step before
    authentication?
  • Question 135

    An offsite information processing facility: