Question: 1
Which of the following controls is MOST appropriate against brute force attacks at login?
Question: 2
Which of the following is MOST important for an IS auditor to verify when reviewing a critical business application that requires high availability?
Question: 3
An organization has performance metrics to track how well IT resources are being used, but there has been little progress on meeting the organization's goals. Which of the following would be MOST helpful to determine the underlying reason?
Question: 4
Which procedure provides the GREATEST assurance that corrective action to an audit report has been taken?
Question: 5
Which of ihe following should be done FIRST to effectively define the IT audit universe for an entity with multiple business lines?