Question: 1
An IS auditor is reviewing an organization's implementation of a bring your own device (BYOD) program. Which of the following would be the BEST recommendation to help ensure sensitive data is protected if a device is in the possession of an unauthorized individual?
Question: 2
An IS auditor is performing a post-implementation review of a system deployed two years ago Which of the following findings should be of MOST concern to the auditor?
Question: 3
An IS auditor submitted audit reports and scheduled a follow-up audit engagement with a client The client has requested to engage the services of the same auditor to develop enhanced controls. What Is the GREATEST concern with this request?
Question: 4
Which of the following is MOST important for an IS auditor to consider when evaluating an organization's effectiveness in mitigating Internal fraud risk?
Question: 5
When reviewing access controls, an internal auditor discovers unauthorized access rights to confidential network folders. What is the auditor's FIRST action?