1. To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should recommend:
A) online terminals are placed in restricted areas.
B) online terminals are equipped with key locks.
C) ID cards are required to gain access to online terminals.
D) online access is terminated after a specified number of unsuccessful attempts.
2. An IS auditor conducting an access control review in a client-server environment discovers that all printing options are accessible by all users. In this situation, theIS auditor is MOST likely to conclude that:
A) exposure is greater, since information is available to unauthorized users.
B) operating efficiency is enhanced, since anyone can print any report at any time.
C) operating procedures are more effective, since information is easily available.
D) user friendliness and flexibility is facilitated, since there is a smooth flow of information among users.
3. Sign-on procedures include the creation of a unique user ID and password. However, an IS auditor discovers that in many cases the username and password are the same. The BEST control to mitigate this risk is to:
A) change the company's security policy.
B) educate users about the risk of weak passwords.
C) build in validations to prevent this during user creation and password change.
D) require a periodic review of matching user ID and passwords for detection and correction.
4. The PRIMARY objective of a logical access control review is to:
A) review access controls provided through software.
B) ensure access is granted per the organization's authorities.
C) walk through and assess the access provided in the IT environment.
D) provide assurance that computer hardware is adequately protected against abuse.
5. Naming conventions for system resources are important for access control because they:
A) ensure that resource names are not ambiguous.
B) reduce the number of rules required to adequately protect resources.
C) ensure that user access to resources is clearly and uniquely identified.
D) ensure that internationally recognized names are used to protect resources.