Question: 1
Which of the following is the MOST effective way to assess whether an outsourcer's controls are following the service level agreement (SLA)?
Question: 2
An organization has implemented an automated match between purchase orders, goods receipts, and invoices. Which of the following risks will this control BEST mitigate?
Question: 3
Which of the following would help determine the maturity of an information security awareness program?
Question: 4
Which of the following is the PRIMARY benefit of including IT management and staff when conducting control self-assessments (CSAs) within an organization?
Question: 5
A government organization uses standard Wi-Fi Protected Access 2 (WPA2) to protect confidential information transmitted to a file server. Which of the following is the IS auditor's BEST recommendation to further strengthen security?