Question: 1
Following a breach, what is the BEST source 10 determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Question: 2
An IS auditor is executing a risk-based IS audit strategy to ensure that key areas are audited Which of the following should be of GREATEST concern to the auditor?
Question: 3
The results of an IS audit indicating the need to strengthen controls has been communicated to the appropriate stakeholders. Which of the following is the BEST way for management to enforce implementation of the recommendations?
Question: 4
Which of the following is the PRIMARY purpose for external assessments of internal audit's quality assurance (OA) systems and frameworks?
Question: 5
The PRIMARY focus of audit follow-up reports should be to: