An IS auditor observes a weakness in the tape management system at a data center in that some parameters are set to bypass or ignore tape header records. Which of the following is the MOST effective compensating control for this weakness?
Which of the following type of an IDS resides on important systems like database, critical servers and
monitors various internal resources of an operating system?
Which of the following is the MOST effective way to achieve the integration of information security governance into corporate governance?
Which of the following techniques is MOST appropriate for verifying application program controls?
A live test of a mutual agreement for IT system recovery has been carried out, including a
four-hour test of intensive usage by the business units. The test has been successful, but gives only partial assurance that the: