Which of the following communication modes should be of GREATEST concern to an IS auditor evaluating end-user networking?
Click on the arrows to vote for the correct answer
A. B. C. D.B.
In evaluating end-user networking, an IS auditor should be concerned with the communication modes that pose the greatest risks to the security and integrity of the network. Each of the communication modes listed in the question has its own unique characteristics and vulnerabilities.
System-to-system communication involves the exchange of data between two or more computer systems. This type of communication may be vulnerable to attacks such as unauthorized access or interception of data in transit. However, system-to-system communication typically occurs within a controlled environment, such as a corporate network, and is therefore less of a concern for an IS auditor evaluating end-user networking.
Peer-to-peer communication involves the direct exchange of data between two or more computers without the use of a central server or other intermediary. This type of communication may be vulnerable to attacks such as malware infections, data theft, and unauthorized access. Peer-to-peer communication is often used for file sharing and other collaborative activities, and as such may be a concern for an IS auditor evaluating end-user networking.
Host-to-host communication involves the exchange of data between two or more devices connected to a network. This type of communication may be vulnerable to attacks such as denial of service (DoS) attacks, IP spoofing, and other network-based attacks. Host-to-host communication is common in many types of networking environments and may be a concern for an IS auditor evaluating end-user networking.
Client-to-server communication involves the exchange of data between a client computer and a server computer. This type of communication is commonly used in web browsing, email, and other network-based applications. Client-to-server communication may be vulnerable to attacks such as man-in-the-middle attacks, SQL injection, and other application-layer attacks. Client-to-server communication is likely the mode of greatest concern for an IS auditor evaluating end-user networking, as it is often the primary means by which end users access network resources and applications.
In conclusion, based on the given options, the communication mode of greatest concern to an IS auditor evaluating end-user networking would be client-to-server communication.