Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?
Which of the following concerns is BEST addressed by securing production source libraries?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?