Question 86

Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
  • Question 87

    Capacity management enables organizations to:
  • Question 88

    When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
  • Question 89

    During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
  • Question 90

    Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?