Here are the answers to the self-assessment questions.
Common technology components
- Answer: C. The risk of eavesdropping
Explanation: RFID tags are exposed to the risk of eavesdropping. It is the same as a wireless device. RFID, by its nature, is not subject to other exposure, such as social engineering, phishing, or malicious code. - Answer: A. The availability report
Explanation: An availability report indicates the time period during which the system is up and available for use. An IS auditor can determine downtime with the help of availability reports. Utilization reports determine the level of use of systems. A utilization report is used to predict resource requirements. Asset management reports include an inventory of assets. Hardware error reports identify system failures and other issues. - Answer: A. The system downtime report
Explanation: The system downtime log indicates the effectiveness of preventive maintenance programs. High downtime indicates that preventive maintenance...