Which of the following intrusion detection systems (IDSs) monitors the general patterns of activity and traffic on a network and creates a database?
An IS auditor should expect the responsibility for authorizing access rights to production data and systems to be entrusted to the:
An IS auditor should expect the responsibility for authorizing access rights to production data and systems to be entrusted to the:
Which of the following would MOST effectively enhance the security of a challenge-response based authentication system?
Which of the following would MOST effectively enhance the security of a challenge-response based authentication system?
What should be the GREATEST concern to an IS auditor when employees use portable media (MP3 players, flash drives)?