Question: 1
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts the auditor's BEST recommendation Is to place an Intrusion detection system ID between the firewall and:
Question: 2
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verity the organizations information security plan Include:
Question: 3
Following a security breach m which a hacker exploited a well-known vulnerability in the domain controller, an IS auditor has been asked to conduct a control assessment. The auditor's BEST course of action would be to determine if:
Question: 4
In an environment where development and IT operations teams are integrated (DevOps). which of the following approaches provides the BEST assurance for the automatic deployment of code into production?
Question: 5
During an audit of a multinational bank's disposal process, an IS auditor notes several findings Which of the following should be the auditor's GREATEST concern?