CH 7. QUIZ

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which audit data collection method helps ensure that the information-gathering process covers all relevant areas?

Checklist

What information should an auditor share with the client during an exit interview?

Details on major issues

Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion alert each time that an administrator connects to a server using Secure Shell (SSH). What type of error is occurring?

False positive error

When should an organization's managers have an opportunity to respond to the findings in an audit?

Managers should include their responses to the draft audit report in the final audit report.

Which security testing activity uses tools that scan for services running on systems?

Network mapping

Which activity is an auditor least likely to conduct during the information-gathering phase of an audit?

Report writing

Emily is the information security director for a large company that handles sensitive personal information. She is hiring an auditor to conduct an assessment demonstrating that her firm is satisfying requirements regarding customer private data. What type of assessment should she request?

SOC 3

Gina is preparing to monitor network activity using packet sniffing. Which technology is most likely to interfere with this effort if used on the network?

Secure Sockets Layer (SSL)

Which intrusion detection system strategy relies upon pattern matching?

Signature detection

Ricky is reviewing security logs to independently assess security controls. Which security review process is Ricky engaging in?

audit


Conjuntos de estudio relacionados

LS1 Week 8 Chapter 58 Assessment and Management of Patients with Breast Disorders

View Set