Question: 1
Which of the following is the BEST approach to verify that internal help desk procedures are executed in compliance with policies?
Question: 2
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor s NEXT course of action?
Question: 3
Which of the following would MOST likely impact the integrity of a database backup?
Question: 4
..control that MOST effectively addresses the risk of piggybackingAailgating into a restricted area without a dead-man door is:
Question: 5
An internal audit department recently established a quality assurance (QA) program as part of its overall audit program. Which of the following activities is MOST important to rlude as part of the QA program requirements?