Question: 1
An organization that has suffered a cyber attack is performing a forensic analysis of the affected users' computers Which of the following should be of GREATEST concern for the IS editor reviewing this process?
Question: 2
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
Question: 3
What is the PRIMARY reason to adopt a risk-based IS audit strategy?
Question: 4
Which of the following governance functions is responsible for ensuring IT projects have sufficient resources and are prioritized appropriately?
Question: 5
An organization is shifting to a remote workforce. In preparation, the IT department is performing stress and capacity testing of remote access infrastructure and systems. What type of control is being implemented?