Question: 1
Which of the following should be the MOST important consideration when prioritizing IS audit activities
Question: 2
When evaluating a protect immediately prior to implementation, which of the following would provide the BEST evidence that the system has the required functionality?
Question: 3
An organization experienced a domain name system (DNS) attack caused by default user accounts not being removed from one of the servers. Which of the following would have been the BEST way to mitigate the risk of this DNS attack1?
Question: 4
An organization plans to migrate some applications to an externally hosted data center However, the service provider has indicated that it does not provide assurance reports over controls in the data center. What would be an IS auditor's BEST recommendation to management in the absence of a third-party assurance report?
Question: 5
An IS auditor has been invited to join an IT project team responsible for building and deploying a new digital customer marketing platform Which of the following is the BEST way for the auditor to support this project while maintaining independence?