The PRIMARY objective of an audit of IT security policies is to ensure that:
The PRIMARY objective of an audit of IT security policies is to ensure that:
The vulnerability identified is:
An internal review of a web-based application system finds the ability to gain access to all
employees’ accounts by changing the employee’s ID on the URL used for accessing the account.
The vulnerability identified is:
Which of the following is NOT true for Key Risk Indicators?
Which of the following is NOT true for Key Risk Indicators?
The rate of change in technology increases the importance of:
The rate of change in technology increases the importance of:
which phase of the project?
A test plan to validate the security controls of a new system should be developed during which
phase of the project?
The IS auditor should conclude that:
An IS auditor finds that not all employees are aware of the enterprise’s information security policy.
The IS auditor should conclude that:
The MOST effective way to ensure that outsourced service providers comply with the organization’s inform
The MOST effective way to ensure that outsourced service providers comply with the
organization’s information security policy would be:
Which of the following data extraction methods you are using here?
You are the project manager of the GHT project. You are accessing data for further analysis. You
have chosen such a data extraction method in which management monitors its own controls.
Which of the following data extraction methods you are using here?
The development of an IS security policy is ultimately the responsibility of the:
The development of an IS security policy is ultimately the responsibility of the:
In order to protect a network against unauthorized external connections to corporate systems, the information
In order to protect a network against unauthorized external connections to corporate systems, the
information security manager should BEST implement: