Question: 1
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program?
Question: 2
A detailed audit of user access rights results In many high-risk findings Once management reports that all recommendations have been implemented, which of the following is the IS auditor's BEST course of action?
Question: 3
Which of the following reliably associates users and their public keys and Includes attributes that uniquely identify the users?
Question: 4
During an internal audit of an organization's information security program, the IS auditor observes a number of security incidents nave remained open over an extended period of time What is the IS auditor's BEST course of action?
Question: 5
An IS auditor reviewing an organization's data privacy controls observes that privacy notices do not clearly state how the organization uses customer data for its processing operations. Which of the following data protection principles MUST be implemented to address this gap?