Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1.Once the risk exposures have been identified, this step in the business contin

ID: 456933 • Letter: 1

Question

1.Once the risk exposures have been identified, this step in the business continuity planning process should be performed:

(a)Business impact assessment (BIA).

(b)Reporting and analysis.

(c)Risk mitigation.

(d)Information and data classification.

Which of the following BEST describes the benefits of implementing a centralized identity management process?

(a)More calls to the Help Desk.

(b)Fewer calls to the Help Desk.

(c)Enhanced and consistent risk management and accountability.

(d)Improved password selection by end users.

1. An IT auditor completed an audit of access controls and identified weak and inconsistent password settings on various systems. Which of the following is the MOST likely reason for these weak password settings?

(a)An automated tool is not being used to enforce password compliance.

(b)The company does not maintain a clearly written policy regarding its password configuration requirements.

(c)The various systems are difficult to configure.

(d)End users complained about the need to change their passwords.

1.An IT auditor is conducting a review of the company’s web application security. In planning the audit, the IT auditor should:

(a)Include a web application security specialist on the audit team to support the overall audit effort.

(b)Understand past issues or auditing findings that have involved web applications.

(c)Determine the scope and objective of the audit.

(d)All of the above.

Explanation / Answer

.Once the risk exposures have been identified, this step in the business continuity planning process should be performed:

(b)Reporting and analysis.

Which of the following BEST describes the benefits of implementing a centralized identity management process?

(d)Improved password selection by end users.

An IT auditor completed an audit of access controls and identified weak and inconsistent password settings on various systems. Which of the following is the MOSTlikely reason for these weak password settings?

(a)An automated tool is not being used to enforce password compliance.

An IT auditor is conducting a review of the company’s web application security. In planning the audit, the IT auditor should:

(d)All of the above.