Question 521

During an IS audit, auditor has observed that authentication and authorization steps are split into two functions and there is a possibility to force the authorization step to be completed before the authentication step. Which of the following technique an attacker could user to force authorization step before authentication?
  • Question 522

    Which of the following is the BEST approach to identify noncompliance issues with legal, regulatory, and contractual requirements?
  • Question 523

    Which of the following is the BEST indicator for measuring performance of the IT help desk function?
  • Question 524

    A lower recovery time objective (RTO) results in:
  • Question 525

    Digital signatures require the: