Question: 1
Which of the following Is the MOST important consideration when Investigating a security breach of an e-commerce application?
Question: 2
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
Question: 3
End users have been demanding the ability to use their own devices for work, but want to keep personal information out of corporate control. Which of the following would be MOST effective at reducing the risk of security incidents while satisfying end user requirements?
Question: 4
As part of an audit response, an auditee has concerns with the recommendations and is hesitant to implement them. Which of the following would be the BEST course of action for the IS auditor?
Question: 5
An IS auditor discovers an option in a database that allows the administrator to directly modify any table This option is necessary to overcome Dugs in the software, but is rarely used Changes to tables are automatically logged The IS auditors FIRST action should be to: