Which of the following types of attack works by taking advantage of the unenforced and unchecked
assumptions the system makes about its inputs?
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
To aid management in achieving IT and business alignment, an IS auditor should recommend the use of:
The most common problem in the operation of an intrusion detection system (IDS) is:
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner Which of the following is the auditor s BEST recommendation?