When a significant security breach occurs, what should be reported FIRST to senior management?
When a significant security breach occurs, what should be reported FIRST to senior management?
Which of the following would BEST ensure that the orders are entered accurately and the corresponding products
A company has implemented a new client-server enterprise resource planning (ERP) system. Local branches transmit customer orders to a central manufacturing facility. Which of the following would BEST ensure that the orders are entered accurately and the corresponding products are produced?
Which of the following would be an IS auditor’s main concern about the new process?
A company undertakes a business process reengineering (BPR) project in support of a new and direct marketing approach to its customers. Which of the following would be an IS auditor’s main concern about the new process?
The information security manager should recommend to business management that the risk be:
After a risk assessment, it is determined that the cost to mitigate the risk is much greater than the benefit to be derived. The information security manager should recommend to business management that the risk be:
Who is responsible for ensuring that information is classified?
Who is responsible for ensuring that information is classified?
Which of the following should an IS auditor recommend?
Business units are concerned about the performance of a newly implemented system. Which of the following should an IS auditor recommend?
Which of the following would help to ensure the portability of an application connected to a database?
Which of the following would help to ensure the portability of an application connected to a database?
This principle of data integrity is known as:
In an online transaction processing system, data integrity is maintained by ensuring that a transaction is either completed in its entirety or not at all. This principle of data integrity is known as:
What does a network vulnerability assessment intend to identify?
What does a network vulnerability assessment intend to identify?
One way to determine control effectiveness is by determining:
One way to determine control effectiveness is by determining: