Topic 1: Exam Pool A
Which of the following would be the MOST effective method to address software license violations on employee workstations?
A.
Implementing real-time monitoring software on employee workstations
B.
Restricting administrative rights on employee workstations
C.
Scanning of workstation daily for unauthorized software use
D.
Required automated installation of software.
Implementing real-time monitoring software on employee workstations
The maturity level of an organization s problem management support function is optimized when the function
A.
has formally documented the escalation process.
B.
proactively provides solutions
C.
resolves requests in a timely manner
D.
analyzes critical incidents to identify root cause
proactively provides solutions
Which of the following is MOST likely to be prevented by a firewall connected to the Internet?
A.
Disclosure of public key infrastructure (PKI) keys
B.
Alteration of email message content
C.
Dial-m penetration attacks
D.
External spoofing of internal addresses
External spoofing of internal addresses
An IS auditor has assessed a payroll service provider’s security policy and finds significant topics are missing. Which of the following is the auditor’s BEST course of action?
A.
Recommend the service provider update their policy
B.
Report the risk to internal management
C.
Notify the service provider of the discrepancies.
D.
Recommend replacement of the service provider
Report the risk to internal management
The FIRST step in establishing a firewall security policy is to determine the:
A.
expected data Throughput.
B.
business requirements,
C.
existing firewall configuration,
D.
necessary logical access rights
business requirements,
Page 2 out of 204 Pages |
Previous |