You work as a Network Administrator for ABC Inc. The company uses a secure wireless network.
John complains to you that his computer is not working properly. What type of security audit do you
need to conduct to resolve the problem?
A.
Operational audit
B.
Dependent audit
C.
Non-operational audit
D.
Independent audit
Explanation:
An independent audit is an audit that is usually conducted by external or outside resources. It is the
process of reviewing detailed audit logs for the following purposes:
To examine the system activities and access logs
To assess the adequacy of system methods
To assess the adequacy of system controls
To examine compliance with established enterprise network system policies
To examine compliance with established enterprise network system procedures
To examine effectiveness of enabling, support, and core processes
Answer option B is incorrect. It is not a valid type of security audit.
Answer option A is incorrect. It is done to examine the operational and ongoing activities within a
network.
Answer option C is incorrect. It is not a valid type of security audit.
Guide to Tactical Perimeter Defense, Contents: “Network Auditing Concepts”