An IS auditor is performing a network security review of a telecom company that provides Internet connection services to shopping malls for their wireless customers. The company uses wireless transport layer security (WTLS) and secure socket layers (SSL) technology for protecting their customers payment information. The IS auditor should be MOST concerned, if a hacker:
Submitted by: Administrator1. compromised the wireless application protocol (WAP) gateway.
2. installed a sniffing program in front of the server.
3. stole a customer's PDA.
4. listened to the wireless transmission.
Answer: A
Submitted by: Administrator
2. installed a sniffing program in front of the server.
3. stole a customer's PDA.
4. listened to the wireless transmission.
Answer: A
Submitted by: Administrator
Read Online CISA Job Interview Questions And Answers
Top CISA Questions
☺ | An IS auditor is performing an audit of a network operating system. Which of the following is a user feature the IS auditor should review? |
☺ | Which of the following is the MOST effective control when granting temporary access to vendors? |
☺ | While designing the business continuity plan (BCP) for an airline reservation system, the MOST appropriate method of data transfer/backup at an offsite location would be: |
☺ | Which of the following cryptography options would increase overhead/cost? |
☺ | IT control objectives are useful to IS auditors, as they provide the basis for understanding the: |
Top IT (Information Technology) Categories
☺ | Computer Operator Interview Questions. |
☺ | Telecommunications Interview Questions. |
☺ | Information Technology Interview Questions. |
☺ | Data Entry Interview Questions. |
☺ | IT Support Interview Questions. |