CISA Exam Question 86

During an IS audit, auditor has observed that authentication and authorization steps are split into two functions and there is a possibility to force the authorization step to be completed before the authentication step. Which of the following technique an attacker could user to force authorization step before authentication?
  • CISA Exam Question 87

    Which of the following attack occurs when a malicious action is performed by invoking the operating system to execute a particular system call?
  • CISA Exam Question 88

    Which of the following is protocol data unit (PDU) of transport layer in TCP/IP model?
  • CISA Exam Question 89

    An existing system is being replaced with a new application package. User acceptance testing (UAT) should ensure that:
  • CISA Exam Question 90

    Which of the following layer of an OSI model responsible for routing and forwarding of a network packets?