Which of the following attacks is BEST detected by an intrusion detection system (IDS)?
Which of the following is a technique that could be used to capture network user passwords?
Which of the following methods should be used to purge confidential data from write-once optical media?
An IS auditor is performing a routine procedure to test for the possible existence of fraudulent transactions.
Given there is no reason to suspect the existence of fraudulent transactions, which of the following data analytics techniques should be employed?
An IS auditor is using a statistical sample to inventory the tape library. What type of test would this be considered?