application support team, not operations staff. Read access to production
data is a normal requirement of a computer operator, as is logged access
to programs and access to JCL to control job execution.
438
、
The MOST likely explanation for a successful social engineering
attack is:
A
、
that computers make logic errors.
B
、
that people make judgment errors.
C
、
the computer knowledge of the attackers.
D
、
the technological sophistication of the attack method.
ANSWER:B
NOTE:Humans make errors in judging others; they may trust someone when, in
fact, the person is untrustworthy. Driven by logic, computers make the
same error every time they execute the erroneous logic; however, this is
not the basic argument in designing a social engineering attack.
Generally, social engineering attacks do not require technological
expertise; often, the attacker is not proficient in information technology
or systems. Social engineering attacks are human-based and generally do
not involve complicated technology.
439
、
The rate of change in technology increases the importance of:
A
、
outsourcing the IS function.
B
、
implementing and enforcing good processes.
C
、
hiring personnel willing to make a career within the organization.
D
、
meeting user requirements.
ANSWER:B
NOTE:Change requires that good change management processes be implemented
and enforced. Outsourcing the IS function is not directly related to the
rate of technological change. Personnel in a typical IS department are
highly qualified and educated; usually they do not feel their jobs are at
risk and are prepared to switch jobs frequently. Although meeting user
requirements is important, it is not directly related to the rate of
technological change in the IS environment.
440
、
An IS auditor is performing an audit of a network operating system.
Which of the following is a user feature the IS auditor should review?
A
、
Availability of online network documentation
B
、
Support of terminal access to remote hosts