Question 91

When developing a risk-based audit strategy, an IS auditor conduct a risk assessment to ensure that:
  • Question 92

    A computer system is no more secure than the human systems responsible for its operation. Malicious individuals have regularly penetrated well-designed, secure computer systems by taking advantage of the carelessness of trusted individuals, or by deliberately deceiving them.
    zombie computers are being HEAVILY relied upon on by which of the following types of attack?
  • Question 93

    To help ensure the organization's information assets are adequately protected, which of the following considerations is MOST important when developing an information classification and handling policy?
  • Question 94

    The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:
  • Question 95

    Which of the following is a general operating system access control function?