Which of the following controls would BEST prevent accidental system shutdown from the console or operations a
Which of the following controls would BEST prevent accidental system shutdown from the console or operations area?
When reviewing an organization’s approved software product list, which of the following is the MOST impo
When reviewing an organization’s approved software product list, which of the following is the MOST important thing to verify?
When evaluating the controls of an EDI application, an IS auditor should PRIMARILY be concerned with the risk
When evaluating the controls of an EDI application, an IS auditor should PRIMARILY be concerned with the risk of:
The MAIN reason for deploying a public key infrastructure (PKI) when implementing an information security prog
The MAIN reason for deploying a public key infrastructure (PKI) when implementing an information security program is to:
Priority should be given to which of the following to ensure effective implementation of information security
Priority should be given to which of the following to ensure effective implementation of information security governance?
The BEST response the auditor can make is to:
An IS auditor reviewing an accounts payable system discovers that audit logs are not being reviewed. When this issue is raised with management the response is that additional controls are not necessary because effective system access controls are inplace. The BEST response the auditor can make is to:
Which of the following controls is MOST effective in providing reasonable assurance that the change was author
A clerk changed the interest rate for a loan on a master file. The rate entered is outside the normal range for such a loan. Which of the following controls is MOST effective in providing reasonable assurance that the change was authorized?
When using an integrated test facility (ITF), an IS auditor should ensure that:
When using an integrated test facility (ITF), an IS auditor should ensure that:
The PRIMARY driver to obtain external resources to execute the information security program is that external r
The PRIMARY driver to obtain external resources to execute the information security program is that external resources can:
This is an example of:
An organization has decided to implement additional security controls to treat the risks of a new process. This is an example of: