Question 16

Which of the following BEST facilitates detection of zero-day exploits?
  • Question 17

    An IS department is evaluated monthly on its cost-revenue ratio, user satisfaction rate, and computer downtime. This is BEST characterized as an application of:
  • Question 18

    Which of the following statements pertaining to IPSec is incorrect?
  • Question 19

    The MOST important factors in determining the scope and timing for testing a business continuity plan are:
  • Question 20

    An organization's IT security policy states that user ID's must uniquely identify individual's and that user should not disclose their passwords. An IS auditor discovers that several generic user ID's are being used.
    Which of the following is the MOST appropriate course of action for the auditor/