Question 36
A technical lead who was working on a major project has left the organization. The project manager reports suspicious system activities on one of the servers that is accessible to the whole team. What would be of GREATEST concern if discoveredduring a forensic investigation?
Question 37
Which of the following is MOST effective for controlling visitor access to a data center?
Question 38
An IS auditor reviewing the key roles and responsibilities of the database administrator (DBA) is LEAST likely to expect the job description of the DBA to include:
Question 39
During a post-incident review of a security breach, what type of analysis should an IS auditor expect to be performed by the organization's information security team?
Question 40
After observing suspicious activities in a server, a manager requests a forensic analysis.
Which of the following findings should be of MOST concern to the investigator?
Which of the following findings should be of MOST concern to the investigator?