Question 46

Which of the following should an IS auditor expect to find when reviewing IT security policy?
  • Question 47

    Which of the following findings should be of GREATEST concern to an IS auditor conducting a forensic analysis following incidents of suspicious activities on a server?
  • Question 48

    An IS audit reveals an organization's IT department reports any deviations from its security standards to an internal IT risk committee involving IT senior management. Which of the following should be the IS auditor's GREATEST concern?
  • Question 49

    Which of the following would be an appropriate role of internal audit in helping to establish an organization's privacy program?
  • Question 50

    A financial institution is launching a mobile banking service utilizing multi-factor authentication. This access control is an example of which of the following?