The MOST appropriate individual to determine the level of information security needed for a specific business
The MOST appropriate individual to determine the level of information security needed for a
specific business application is the:
Which of the following are the responsibilities of Enterprise risk committee?
Which of the following are the responsibilities of Enterprise risk committee?
Each correct answer represents a complete solution. Choose three.
An IS auditor reviewing an outsourcing contract of IT facilities would expect it to define the:
An IS auditor reviewing an outsourcing contract of IT facilities would expect it to define the:
Which of the following is the MOST likely to change an organization’s culture to one that is more securi
Which of the following is the MOST likely to change an organization’s culture to one that is more
security conscious?
Which of the following will MOST likely reduce the chances of an unauthorized individual gaining access to com
Which of the following will MOST likely reduce the chances of an unauthorized individual gaining
access to computing resources by pretending to be an authorized individual needing to have his,
her password reset?
which type control?
Malicious code protection is which type control?
which of the following conclusions should be the main concern of the IS auditor?
When performing a review of the structure of an electronic funds transfer (EFT) system, an IS
auditor observes that the technological infrastructure is based on a centralized processing scheme
that has been outsourced to a provider in another country. Based on this information, which of the
following conclusions should be the main concern of the IS auditor?
The BEST way to ensure that an external service provider complies with organizational security policies is to
The BEST way to ensure that an external service provider complies with organizational security
policies is to:
what ability?
If one says that the particular control or monitoring tool is sustainable, then it refers to what ability?
which of the following items to be included in the request for proposal (RFP) when IS is procuring services fr
An IS auditor should expect which of the following items to be included in the request for proposal
(RFP) when IS is procuring services from an independent service provider (ISP)?
