Question: 1
After the release of an application system, an IS auditor wants to verify that the system is providing value to the organization. The auditor's BEST course of action would be to:
Question: 2
Which of the following is the MOST effective control to mitigate unintentional misuse of authorised access?
Question: 3
Which of the following is MOST important for an IS auditor to consider during a review of the IT governance of an organization?
Question: 4
A recent audit concluded that an organization's information security system was weak and that monitoring would likely fail to detect penetration. Which of the following would be the MOST appropriate recommendation?
Question: 5
During a security audit, which of the following is MOST important to review to ensure data confidentiality is managed?