Question: 1
An IS auditor finds that terminated users have access to financial applications. Which of the following is the auditor's MOST important course of action when assessing the impact?
Question: 2
Which of the following should be the PRIMARY objective of a migration audit?
Question: 3
A third-party service provider is hosting a private cloud for an organization. Which of the following findings during an audit of the provider poses the GREATEST risk to the organization?
Question: 4
Which of the following represents a potential single point of failure in the virtualized environment that could result in a compromise with greater scope and impact?
Question: 5
When a firewall is subjected to a probing attack, the MOST appropriate first response is for the firewall to: