Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?