Question: 1
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
Question: 2
A subsidiary company uses macro-enabled spreadsheets to convert reporting from Its finance system to upload journals to the parent company's finance system What Is the GREATEST potential risk In this scenario?
Question: 3
Which of the following findings should be of GREATEST concern to an IS auditor performing an information security audit of critical server log management activities?
Question: 4
Which type of control is an IS auditor assessing when reviewing the adequacy of existing policies and procedures related to end-user computing activities?
Question: 5
An IS auditor testing the user access management process for a critical financial application identifies active users who have left the organization Which ot the following should the auditor do NEXT?