1.
Recovery point objectives (RPOs) can be used to determine which of the following?
2.
When electronically stored information is requested during a fraud investigation, which of the following should be the FIRST priority?
3.
When creating a forensic image of a hard drive, which of the following should be the FIRST step?
4.
Which of the following is the initial step in creating a firewall policy?
5.
When developing a security architecture, which of the following steps should be executed FIRST?
6.
An organization provides information to its supply chain partners and customers through an extranet infrastructure. Which of the following should be the GREATEST concern to an IS auditor reviewing the firewall security architecture?
7.
Which of the following is MOST critical for the successful implementation and maintenance of a security policy?
8.
Which of the following reduces the potential impact of social engineering attacks?
9.
Which of the following activities performed by a database administrator (DBA) should be performed by a different person?
10.
When segregation of duties concerns exists between IT support staff and end users, what would be a suitable compensating control?