When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
Which of the following BEST enables the timely identification of risk exposure?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery: