Which of the following methods is used by internal security teams to assess the security of internally developed application?
Active reconnaissance
Pivoting
White box testing
persistence
Which of the following methods is used by internal security teams to assess the security of...
If an auditor decides to assess control risk as low based on IT application control procedures, which of the following would not be part of the auditor’s strategy for testing controls? a. Testing the effectiveness of management review controls used to monitor the results of operations. b. Testing the effectiveness of manual follow-up procedures. c. Testing the effectiveness of the application with test data. d. Testing the effectiveness of IT general control procedures.
Which of the following methods should be used to determine the concentration of the analyte when there is a significant "matrix effect" in the sample? Spike recovery Internal Standard Calibration curve Standard additions
Question 2 2.5 p Which of the following methods should be used to determine the concentration of the analyte when there is a significant "matrix effect" in the sample? Standard additions Calibration curve Spike recovery Internal Standard - Previous Next BY ADVANCED AUDIO TOSHIBA
While reviewing web server logs, a security analyst notices the following code: Which of the following would prevent this code from performing malicious actions? (choose one and why) Performing web application penetration testing Requiring the application to use input validation Disabling the use of HTTP and requiring the use of HTTPS Installing a network firewall in front of the application GET http://testphp.comptia.org/profiles.php?id=-1 UNION SELECT 1, 2, 3 HTTP/1.1 Host: testphp.comptia.org GET http://testphp.comptia.org/profiles.php?id=-1 UNION SELECT 1, 2, 3 HTTP/1.1 Host: testphp.comptia.org
7.Which of the following factors is used by the audit team to assess the risk of fraud? A. Pressure and opportunities for management to commit forgery B. Inclusion of elements of unpredictability C. Misappropriation of assets D. Modification of planned audit procedures
1. Which of the following methods of project analysis are most commonly used by CFO's? internal rate of return and net present value discounted payback and net present value net present value and payback internal rate of return and payback 2. Consider the following two mutually exclusive projects: Year Cash Flow (A) Cash Flow (B) 0 –$ 341,000 –$ 51,000 1 54,000 24,900 2 74,000 22,900 3 74,000 20,400 4 449,000 15,500 Whichever project you choose, if any,...
1) Information security procedures protect information integrity A) preventing fictitious transactions. B) reducing the system cost. C) making the system more efficient. D) making it impossible for unauthorized users to access the system. 2) There are "white hat" hackers and "black hat" hackers. Cowboy451 was one of the "black hat" hackers. He had researched an exploit and determined that he could penetrate the target system, download a file containing valuable data, and cover his tracks in eight minutes. Six minutes...
After some unauthorized modifications to the documents hosted in an internal web server, a security analyst is searching the access logs for successful attempts to log into the secret area of the application and gather more information about the possible cause. Which of the following filters would allow the analyst to find those entries? grep "/secret/" access_log | grep " 200" grep "/secret/" access_log | grep " 403 grep "/secret/" access_log | grep " 501" TOA С В ОС, OD...
A security auditor is performing a vulnerability scan to find out if mobile applications used in the organization are secure. The auditor discovers that one application has been accessed remotely with no legitimate account credentials. After investigating, it seems the application has allowed has allowed some users to bypass authentication of that application. Which of the following types of malware allow such a compromise to take place? (Select TWO). RAT Ransonware Worm Trojan Backdoor
1.Which of the following statements is TRUE: i) Internal audit’s role is to assess if financial statements are true and fair ii)External auditors are responsible for the identification of all fraud iii)Internal auditors report their audit opinions to shareholders a)i and ii only b)i and iii only c)ii and iii d)None of the above 2.Ruby, an external auditor, has been asked by the Finance Director of Aberdeen Ltd. if she will be the company’s external auditor. Before agreeing to the...