Question: 1
An IS auditor is reviewing the results of a business process improvement project. Which of the following should
be performed FIRST?
Question: 2
Which of the following is MOST important for an IS auditor to consider when auditing a vulnerability scanning
software solution?
Question: 3
A database administrator (DBA) extracts a user listing for an auditor as testing evidence. Which of the following will provide the GREATEST assurance that the user listing is reliable?
Question: 4
An IS auditor is assigned to review the IS department's quality procedures. Upon contacting the IS manager,
the auditor finds that there is an informal unwritten set of standards. Which of the following should be the
auditor's NEXT action?
Question: 5
Which of the following threats is MOST effectively controlled by a firewall?