What is the MOST appropriate recommendation in this sit…
During an audit, an IS auditor notices that the IT department of a medium-sized organization has no separate
risk management function, and the organization’s operational risk documentation only contains a few broadly
described IT risks. What is the MOST appropriate recommendation in this situation?
Which of the following should the IS auditor recommend …
An IS auditor who is reviewing incident reports discovers that, in one instance, an important document left on
an employee’s desk was removed and put in the garbage by the outsourced cleaning staff. Which of the
following should the IS auditor recommend to management?
The PRIMARY benefit of implementing a security program …
The PRIMARY benefit of implementing a security program as part of a security governance framework is the:
Which of the following should be the MOST important con…
Which of the following should be the MOST important consideration when deciding areas of priority for IT
governance implementation?
As a driver of IT governance, transparency of IT’s cost…
As a driver of IT governance, transparency of IT’s cost, value and risks is primarily achieved through:
Which of the following should be considered FIRST when …
Which of the following should be considered FIRST when implementing a risk management program?
Measures of security risk should:
An IS auditor is reviewing an IT security risk management program. Measures of security risk should:
An IS auditor reviewing the risk assessment process of …
An IS auditor reviewing the risk assessment process of an organization should FIRST:
A poor choice of passwords and transmission over unprot…
A poor choice of passwords and transmission over unprotected communications lines are examples of:
This is an example of risk:
To address the risk of operations staff’s failure to perform the daily backup, management requires that the
systems administrator sign off on the daily backup. This is an example of risk: