While reviewing the data migration activity, the MOST important concern for the IS auditor is to determine tha
An organization is migrating from a legacy system to an enterprise resource planning (ERP)
system. While reviewing the data migration activity, the MOST important concern for the IS auditor
is to determine that there is a:
Which of the following would raise security awareness among an organization’s employees?
Which of the following would raise security awareness among an organization’s employees?
The reason a certification and accreditation process is performed on critical systems is to ensure that:
The reason a certification and accreditation process is performed on critical systems is to ensure
that:
Which of the following is the MOST appropriate method of ensuring password strength in a large organization?
Which of the following is the MOST appropriate method of ensuring password strength in a large
organization?
During a postimplementation review of an enterprise resource management system, an IS auditor would MOST likel
During a postimplementation review of an enterprise resource management system, an IS auditor
would MOST likely:
What is the MOST cost-effective method of identifying new vendor vulnerabilities?
What is the MOST cost-effective method of identifying new vendor vulnerabilities?
Which of the following is a corrective control that the IS auditor should recommend?
During an application audit, an IS auditor finds several problems related to corrupted data in the
database. Which of the following is a corrective control that the IS auditor should recommend?
Which of the following is the BEST approach for improving information security management processes?
Which of the following is the BEST approach for improving information security management
processes?
Which of the following controls should the IS auditor recommend to avoid this situation?
An IS auditor finds out-of-range data in some tables of a database. Which of the following controls
should the IS auditor recommend to avoid this situation?
An effective way of protecting applications against Structured Query Language (SQL) injection vulnerability is
An effective way of protecting applications against Structured Query Language (SQL) injection
vulnerability is to: