Question: 1
Which of the following is the BEST method for converting a file into a format suitable for data analysis in a forensic investigation?
Question: 2
An IS auditor observes an organization is performing data backup and restoration testing on an ad hoc basis without a defined process. What is the MOST likely result of a data disruption event?
Question: 3
Which of the following management decisions presents the GREATEST risk associated with data leakage?
Question: 4
In the IT department where segregation of duties is not feasible due to a limited number of resources, a team member is performing the functions of computer operator and reviewer of application logs. Which of the following would be the IS auditor's BEST recommendation?
Question: 5
Which of the following is MOST important for the IS auditor to verify when reviewing the development process of a security policy?