A) Procedures for authorizing transactions B) Echo checks in telecommunications C) A router rule restricting a service D) Programmed edit checks
2. Which of the following is the GREATEST threat to Voice-over Internet Protocol (VoIP) related to privacy release?
A) Incorrect routing B) Eavesdropping C) Call recording D) Denial of service
3. The MOST effective control to detect fraud inside an organization's network, is to:
A) implement an intrusion detection system (IDS) B) apply two-factor authentication C) review access logs D) segregate duties
4. Which of the following is the GREATEST risk of single sign-on?
A) Password carelessness by one user may render the entire infrastructure vulnerable B) Integration of single sign-on with the rest of the infrastructure is complicated C) It is a single point of failure for an enterprise access control process D) One administrator maintains the single sign-on solution without segregation of duty
5. An IT department has given a vendor remote access to the internal network for troubleshooting network performance problems. After discovering the remote activity during a firewall log review, which of the following is the BEST course of action for an information security manager?
A) Revoke the access. B) Review the related service level agreement (SLA). C) Determine the level of access granted. D) Declare a security incident.
Leave a comment