Question: 1
Which of the following should be an IS auditor's FIRST action when assessing the risk associated with unstructured data?
Question: 2
While reviewing the project plan for a new system prior to go-live, an IS auditor notes that the project team has not documented a fallback plan. Which of the following would be the BEST go-live approach in this situation?
Question: 3
An IS auditor finds that corporate mobile devices used by employees have varying levels of password settings. Which of the following would be the BEST recommendation?
Question: 4
Which of the following security mechanisms should be used to prevent disclosures of personally identifiable information (PH) when performing data analytics?
Question: 5
Which of the following should an IS auditor recommend to facilitate the management of baseline requirements for hardening of firewalls?