Which of the following security controls would be me most effective in preventing security breaches?
A. Approval of identity request
B. Access logging
C. Monitoring privileged accounts
D. Audit of access rights
Which of the following common quantitative techniques used in capital budgeting is best associated with the use of a table that describes the present value of an annuity?
A. Cash payback technique.
B. Discounted cash flow technique: net present value
C. Annual rate of return
D. Discounted cash flow technique: internal rate of return.
Which of the following would be a concern related to the authorization controls utilized for a system?
A. Users can only see certain screens in the system.
B. Users are making frequent password change requests
C. Users Input Incorrect passwords and get denied system access
D. Users are all permitted uniform access to the system
An organization has decided to allow its managers to use their own smart phones at work. With this change, which of the following is most important to Include In the IT department's comprehensive policies and procedures?
A. Required documentation of process for discontinuing use of the devices
B. Required removal of personal pictures and contacts.
C. Required documentation of expiration of contract with service provider
D. Required sign-off on conflict of interest statement
Which of the following parties is most likely to be responsible for maintaining the infrastructure required to prevent the failure of a real-time backup of a database?
A. IT database administrator.
B. IT data center manager
C. IT help desk function
D. IT network administrator
Page 2 out of 67 Pages |
Previous |