An IS auditor has scanned an organization's wireless network. Which of the following data sources would BEST enable the auditor to identify rogue wireless access points?
CISA Review Manual (Source 1):
During wireless security audits, auditors are advised to "verify that rogue APs are not used on the organization’s wireless network" by reviewing documentation such as the IT asset inventory. This inventory should list all authorized APs, enabling auditors to compare scanned results against it to detect unauthorized devices.
Sybex Study Guide (Source 2):
Emphasizes the role of an accurate IT asset inventory in network infrastructure audits. It serves as the authoritative record of approved devices, allowing auditors to identify discrepancies during wireless scans
With the organization's IT asset inventory, the IS auditor will be able to identify asset that belong to the organization and rogue assets
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.CISA Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
46080f2
1 month, 1 week agoCisagroup
1 month, 3 weeks ago