Question: 1
The application systems of an organization using open-source software have no single recognized developer producing patches. Which of the following would be the MOST secure way of updating open-source software?
Question: 2
An IS auditor discovers that developers have operator access to the command line of a production environment operating system. Which of the following controls wou Id BEST mitigate the risk of undetected and unauthorized program changes to the production environment?
Question: 3
Which of the following processes should an IS auditor recommend to assist in the
recording of baselines for software releases?
Question: 4
An IS au itor notes that patches for the operating system used by an organization are
deployed by the IT department as advised by the vendor. The MOST significant concern an IS auditor should have with this practice is the nonconsideration bylT of:
Question: 5
In a small organization, developers may release emergency changes directly to production. Which of the following will BEST control the risk in this situation?