Question: 1
Which of the following would be the MOST effective method to address software license violations on employee workstations?
Question: 2
Which of the following is the MOST important requirement for an IS auditor to evaluate when reviewing a transmission of personally identifiable information between two organizations?
Question: 3
An IT governance body wants to determine whether IT service delivery is based on consistently efficient and effective processes. Which of the following would be the BEST approach?
Question: 4
Which of the following is the BEST way to evaluate the effectiveness of access controls to an internal network?
Question: 5
When conducting a follow-up audit on an organization s firewall configuration, the IS auditor discovered that the firewall had been integrated into a new system that provides both firewall and intrusion detection capabilities. The IS auditor should: