1. The directory system of a database-management system describes:
A) The access method to the data B) The location of data AND the access method C) The location of data D) Neither the location of data NOR the access method
2. How is the risk of improper file access affected upon implementing a database system?
A) Risk varies. B) Risk is reduced. C) Risk is not affected. D) Risk is increased.
3. In order to properly protect against unauthorized disclosure of sensitive data, how should hard disks be sanitized?
A) The data should be deleted and overwritten with binary 0s. B) The data should be demagnetized. C) The data should be low-level formatted. D) The data should be deleted.
4. When reviewing print systems spooling, an IS auditor is MOST concerned with which of the following vulnerabilities?
A) The potential for unauthorized deletion of report copies B) The potential for unauthorized modification of report copies C) The potential for unauthorized printing of report copies D) The potential for unauthorized editing of report copies
5. Why is the WAP gateway a component warranting critical concern and review for the IS auditor when auditing and testing controls enforcing message confidentiality?
A) WAP is often configured by default settings and is thus insecure. B) WAP provides weak encryption for wireless traffic. C) WAP functions as a protocol-conversion gateway for wireless TLS to Internet SSL. D) WAP often interfaces critical IT systems.
1. Right Answer: B Explanation: The directory system of a database-management system describes the location of data and the access method.
2. Right Answer: D Explanation: Improper file access becomes a greater risk when implementing a database system.
3. Right Answer: B Explanation: To properly protect against unauthorized disclosure of sensitive data, hard disks should be demagnetized before disposal or release.
4. Right Answer: C Explanation: When reviewing print systems spooling, an IS auditor is most concerned with the potential for unauthorized printing of report copies.
5. Right Answer: C Explanation: Functioning as a protocol-conversion gateway for wireless TLS to Internet SSL, the WAP gateway is a component warranting critical concern and review for the IS auditor when auditing and testing controls that enforce message confidentiality
Leave a comment