While financ might also involve IT auditors to examine the technology in place

While financ might also involve it auditors to

This preview shows page 7 - 11 out of 13 pages.

expenditures, so it calls upon the services of financial auditors. While financ might also involve IT auditors to examine the technology in place to gather Selected Answer: arbitrage Correct Answer: integrated audit There are many ways that people can be manipulated to disclose knowledg someone under the false pretense of being from the IT department. This is k Selected Answer: pretexting Correct Answer: pretexting It is recommended that systems administrators analyze logs in order to dete serve this goal, a ________________ can be used to assemble logs from platfo Selected Answer: log server Correct Answer: log server A procure document should accompany every baseline document. Which of procedure document needs to be created to support the baseline document Selected Answer: Because many configuration processes reuse every configuration. Correct Answer: Because many configuration processes reuse every configuration. ___________________ is a term that denotes a user’s capability to authenticate different applications and devices afterward.
Image of page 7
Selected Answer: Single sign-on Correct Answer: Single sign-on In general, WAN-specific standards identify specific security requirements fo controls needed to secure the connection from the internal network to the W vital for use of Web services provided by suppliers and external partnership Selected Answer: WAN router security standard, Web services standard Correct Answer: WAN router security standard, Web services standard Which of the following has the responsibility of offering instruction on intrus their accompanying uses for diminishing false alerts? Selected Answer: IDS and IPS architecture and management guidelines Correct Answer: IDS and IPS architecture and management guidelines The ______________________ denotes the application software and technology systems that process information. Selected Answer: system/application domain Correct Answer: system/application domain Which of the following statements illustrates the importance of the LAN-to-W Selected
Image of page 8
Answer: The WAN should never have a direct connection and inspected. Correct Answer: The WAN should never have a direct connection and inspected. Which of the following types of baseline documents is often created to serve Selected Answer: proxy server configuration standard Correct Answer: virus scanner configuration standards LAN security policies center on issues concerning connectivity; this includes control standards are _______________, which creates the schedules on LAN-a and ________________, which explains the change control management proce the network Selected Answer: controls over media, controlled maintenance, Correct Answer: controlled maintenance, configuration change control In a business impact analysis (BIA), the phase of defining the business’s com following is not one the objectives? Selected Answer: ascertain the service impact and the financial components Correct Answer: institute recovery time frames for the compon priority only The initial step in creating a business continuity and security response plan security responses in order to diminish losses.
Image of page 9
Selected Answer: business impact analysis Correct Answer: business impact analysis The goal of conducting an incident analysis is to ascertain weakness. Becau
Image of page 10
Image of page 11

You've reached the end of your free preview.

Want to read all 13 pages?

  • Spring '14

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture