Which of the following would be MOST relevant to include in a cost-benefit analysis of a two-factor authentica
Which of the following would be MOST relevant to include in a cost-benefit analysis of a two-factor authentication system?
Responsibility and reporting lines cannot always be established when auditing automated systems since:
Responsibility and reporting lines cannot always be established when auditing automated systems since:
Which of the following controls should the IS auditor recommend to avoid this situation?
An IS auditor finds out-of-range data in some tables of a database. Which of the following controls should the IS auditor recommend to avoid this situation?
What should the information security manager do FIRST?
An organization has to comply with recently published industry regulatory requirements- compliance that potentially has high implementation costs. What should the information security manager do FIRST?
Which of the following would be the MOST important factor to be considered in the loss of mobile equipment wit
Which of the following would be the MOST important factor to be considered in the loss of mobile equipment with unencrypted data?
Which of the following is a corrective control that the IS auditor should recommend?
During an application audit, an IS auditor finds several problems related to corrupted data in the database. Which of the following is a corrective control that the IS auditor should recommend?
During a postimplementation review of an enterprise resource management system, an IS auditor would MOST likel
During a postimplementation review of an enterprise resource management system, an IS auditor would MOST likely:
The reason a certification and accreditation process is performed on critical systems is to ensure that:
The reason a certification and accreditation process is performed on critical systems is to ensure that:
The BEST strategy for risk management is to:
The BEST strategy for risk management is to:
The MAIN reason why asset classification is important to a successful information security program is because
The MAIN reason why asset classification is important to a successful information security program is because classification determines: