Question: 1
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional In two months. Which of the following is the BEST course of action?
Question: 2
Which of the following is the MOST effective way for an organization to protect against data loss?
Question: 3
During an audit of identity and access management, an IS auditor finds that the engagement audit plan does not include the testing of controls that regulate access by third parties Which of the following would be the auditors BEST course of action?
Question: 4
Which of the following is the MOST important feature of access control software?
Question: 5
What is the BEST way is evaluate a control environment where the organization and a third party have shared responsibility?