Which of the following is the BEST metric to measure the alignment of IT and business strategy?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?