Question: 1
Which of the following is the BEST sampling method to ensure only active users have access to critical systems?
Question: 2
A post-implementation review of a development project concludes that several business requirements were not reflected in the software requirement specifications. Which of the following should an IS auditor recommend to reduce this problem in the future?
Question: 3
An IS auditor is reviewing security policies and finds no mention of the return of corporate-owned smartphones upon termination of employment. The GREATEST risk arising from this situation is that unreturned devices:
Question: 4
Which of the following issues identified during a postmortem analysis of the IT security incident response process should be of GREATEST concern?
Question: 5
Which of the following can help ensure that IT deliverables are linked to business goals and that appropriate performance criteria are in place?