A data center has a badge-entry system. Which of the
following is MOSTimportant to protect the computing assets
in the center?
A. Badge readers are installed in locations where tampering
would be noticed
B. The computer that controls the badge system is backed up
frequently
C. A process for promptly deactivating lost or stolen badges
exists
D. All badge entry attempts are logged
Answers were Sorted based on User's Feedback
Answer / baboo
The badge entry system is an access control mecahnism, which helps protect company assest by providing access based on business needs. The process of removing logical access when the badge is lost/employee leaves the organisation, contributes MOST to protection of assets.
Choice A, Tampering of badges is very difficult practically and may not be a feasible option.
Choice D, Logging is not a control. Reviewing logs is a control.
Backing up badge system is would not protect the organisation assets.
| Is This Answer Correct ? | 8 Yes | 1 No |
Answer / abir
C. A process for promptly deactivating lost or stolen badges exists
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / dinesh
The choices A,C and D are important to protect the assets
in data center. The question might be Which one is "Least
important". Kindly clarify.
| Is This Answer Correct ? | 0 Yes | 2 No |
Answer / guest
Choice D appears to be the appropriate answer in the sense that all badge entry attempts, successful or not are logged. This log can be reviewed for any malicious attempt to access the data center
| Is This Answer Correct ? | 0 Yes | 4 No |
Answer / s.arun
The computer that controls the badge system is backed up
frequently
| Is This Answer Correct ? | 0 Yes | 6 No |
A digital signature contains a message digest to: A. show if the message has been altered after transmission. B. define the encryption algorithm. C. confirm the identity of the originator. D. enable message transmission in a digital format.
Which of the following implementation modes would provide the GREATEST amount of security for outbound data connecting to the Internet? A. Transport mode with authentication header plus encapsulating security payload (ESP) B. Secure socket layer (SSL) mode C. Tunnel mode with AH plus ESP D. Triple-DES encryption mode
Large-scale systems development efforts: A. are not affected by the use of prototyping tools. B. can be carried out independent of other organizational practices. C. require that business requirements be defined before the project begins. D. require that project phases and deliverables be defined during the duration of the project.
Which of the following message services provides the strongest protection that a specific action has occurred? A. Proof of delivery B. Nonrepudiation C. Proof of submission D. Message origin authentication
An IS auditor discovers evidence of fraud perpetrated with a manager's user id. The manager had written the password, allocated by the system administrator, inside his/her desk drawer. The IS auditor should conclude that the: A. manager's assistant perpetrated the fraud. B. perpetrator cannot be established beyond doubt. C. fraud must have been perpetrated by the manager. D. system administrator perpetrated the fraud.
A request for a change to a report format in a module (subsystem) was made. After making the required changes, the programmer should carry out: A. unit testing. B. unit and module testing. C. unit, module and regression testing. D. module testing.
Which of the following would be included in an IS strategic plan?
Involvement of senior management is MOST important in the development of: A. strategic plans. B. IS policies. C. IS procedures. D. standards and guidelines.
An IS auditor conducting a review of software usage and licensing discovers that numerous PCs contain unauthorized software. Which of the following actions should the IS auditor take? A. Personally delete all copies of the unauthorized software. B. Inform auditee of the unauthorized software, and follow up to confirm deletion. C. Report the use of the unauthorized software to auditee management and the need to prevent recurrence. D. Take no action, as it is a commonly accepted practice and operations management is responsible for monitoring such use.
Which of the following has the LEAST effect on controlling physical access? A. Access to the work area is restricted through a swipe card. B. All physical assets have an identification tag and are properly recorded. C. Access to the premises is restricted and all visitors authorized for entry. D. Visitors are issued a pass and escorted in and out by a concerned employee.
Passwords should be: A. assigned by the security administrator. B. changed every 30 days at the discretion of the user. C. reused often to ensure the user does not forget the password. D. displayed on the screen so that the user can ensure that it has been entered properly.
Which of the following situations would increase the likelihood of fraud? A. Application programmers are implementing changes to production programs. B. Application programmers are implementing changes to test programs. C. Operations support staff are implementing changes to batch schedules. D. Database administrators are implementing changes to data structures.