Which of the following acts as a decoy to detect active Internet attacks?
Submitted by: Administrator1. Honeypots
2. Firewalls
3. Trapdoors
4. Traffic analysis
Answer: A
Submitted by: Administrator
2. Firewalls
3. Trapdoors
4. Traffic analysis
Answer: A
Submitted by: Administrator
Read Online CISA Job Interview Questions And Answers
Top CISA Questions
| ☺ | An IS auditor is performing an audit of a network operating system. Which of the following is a user feature the IS auditor should review? |
| ☺ | Which of the following is the MOST effective control when granting temporary access to vendors? |
| ☺ | While designing the business continuity plan (BCP) for an airline reservation system, the MOST appropriate method of data transfer/backup at an offsite location would be: |
| ☺ | Which of the following cryptography options would increase overhead/cost? |
| ☺ | IT control objectives are useful to IS auditors, as they provide the basis for understanding the: |
Top IT (Information Technology) Categories
| ☺ | Computer Operator Interview Questions. |
| ☺ | Telecommunications Interview Questions. |
| ☺ | Information Technology Interview Questions. |
| ☺ | Data Entry Interview Questions. |
| ☺ | IT Support Interview Questions. |
