The GREATEST risk when end users have access to a database at its system level, instead of through the application, is that the users can:
During the audit of a database server, which of the following would be considered the GREATEST exposure?
During the audit of a database server, which of the following would be considered the GREATEST exposure?
Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)?
Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)?
An IS auditor examining the configuration of an operating system to verify the controls should review the:
An IS auditor examining the configuration of an operating system to verify the controls should review the:
When reviewing an implementation of a VoIP system over a corporate WAN, an IS auditor should expect to find:
When reviewing an implementation of a VoIP system over a corporate WAN, an IS auditor should expect to find: