Question 36

A technical lead who was working on a major project has left the organization. The project manager reports suspicious system activities on one of the servers that is accessible to the whole team. What would be of GREATEST concern if discoveredduring a forensic investigation?
  • Question 37

    Which of the following is MOST effective for controlling visitor access to a data center?
  • Question 38

    An IS auditor reviewing the key roles and responsibilities of the database administrator (DBA) is LEAST likely to expect the job description of the DBA to include:
  • Question 39

    During a post-incident review of a security breach, what type of analysis should an IS auditor expect to be performed by the organization's information security team?
  • Question 40

    After observing suspicious activities in a server, a manager requests a forensic analysis.
    Which of the following findings should be of MOST concern to the investigator?