IT Audit Final
which of the following is primarily a preventative control for integrity in the WAN domain?
configuration change control
which of the following is NOT a common method of maximizing CIA to the LAN-to-WAN domain?
configure a single ISP connection
which of the following WAN types is the most secure
dedicated leased line
what is the primary type of control used to protect data in the WAN domain?
encryption
you have the least amount of control over who accesses data in the __ domain
WAN
what is meant by distributed application
an environment in which the components that make up an application reside on different servers
a systems administrator sets permissions to prevent unauthorized data access by certain users. Each user can perform his or her job but not access data that their job doesn't require. this is the known principle of
least privileged
which of the following is primarily a preventive control for availability in the WAN domain
multiple redundant connections
use of weak passwords, inappropriate use of internet, inappropriate use of e-mail, and divulging confidential information typically constitutes employee security __ violations.
policy
___ are mechanisms that keep an undesired action from happening such as locked doors or computer access controls
preventive controls
defining access controls where each user has the permission to carry out assigned tasks and nothing else is called the
principle of least privilege
which of the following is a type of firewall that makes requests for remote services on behalf of local clients
proxy server
many organizations use a RACI matrix to document tasks and the personnel responsible for the assignments. RACI stands for __,__, consulted, and informed
responsible, accountable
Within the LAN-to-WAN domain, what connects two or more separate networks
router
what is an intrusion detection system?
a network hardware device or software that detects unusual network activity that might represent an intrusion, sends an alert