Question: 1
Which of the following IS audit findings should be of GREATEST concern when preparing to migrate to a new core system using a direct cut-over?
Question: 2
The FIRST step in establishing a firewall security policy is to determine the:
Question: 3
While planning a security audit, an IS auditor is made aware of a security review carried out by external consultants. It is MOST implement for the auditor to:
Question: 4
Which of the following would be the MOST efficient audit approach, given that a compliance-based approach was adopted in the previous year?
Question: 5
A security company and service provider have merged and the CEO has requested one comprehensive set of security policies be developed for the newly formed company. The IS auditor s BEST recommendation would be to: