Q: 4
Which of the following is MOST important for an IS auditor to verify when evaluating an
organization's firewall?
Options
Discussion
If the logs are already sent off-device, why wouldn't config file access (D) be just as important for audit trust?
A . Audit needs logs kept safe from tampering, so separate protected host is key here.
A , saw similar wording before. For auditors, having logs on a separate protected host means reliable evidence even if the firewall is compromised. Config access (D) is key for ops, but audit integrity relies more on untouched logs. Disagree?
A tbh, audit trail needs to be intact so storing logs off the firewall is critical.
Insider attacks (C) and config file access (D) matter, but the main thing for an IS auditor is that logging is handled securely. Storing logs on a separate protected host (A) makes sure evidence can't just be wiped if the firewall gets popped. Saw something similar on practice, pretty sure it's A.
Be respectful. No spam.
Question 4 of 35