Question 181

Which of the following threats is prevented by using token-based authentication?
  • Question 182

    Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
  • Question 183

    During an operational audit of a biometric system used to control physical access, which of the following should be of GREATEST concern to an IS auditor?
  • Question 184

    An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?
  • Question 185

    A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether: