Which of the following activities performed by a database administrator (DBA) should be performed by a
different person?
The most common problem in the operation of an intrusion detection system (IDS) is:
Which of the following is the MOST important consideration tor an IS auditor when reviewing a vendor selection process?
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to "never expire.' Which of the following recommendations would BEST address the risk with minimal disruption to the business?
Which of the following is the MOST important requirement for an IS auditor to evaluate when reviewing a
transmission of personally identifiable information between two organizations?