... response, 26 3 26 5logging and monitoring, 25 9 26 1NIDS (Network Intrusion DetectionSystem), 26 1 26 3overview, 23 8 24 0proxies, 24 6 24 7testing tools, 26 5 26 7third-party connections,evaluating, 27 0virus ... connections,evaluating, 27 0virus protection, 25 6 25 9VPNs (Virtual Private Networks), 24 9 25 1Web access controls, 25 1 25 4network user access, 22 3 22 4Answer: A The correct answer is A. Management controls ... Interface Cards), 24 5NIDS (Network Intrusion DetectionSystem), 26 1 26 3non-repudiation, defined, 22 1 22 2Oobservation techniques, audit field-work, 40–41Office of the Controller of the Cur-rency...