Question 86
During an audit of a financial application, it was determined thai many terminated users' accounts were not disabled. Which of the following should be the IS auditors NEXT step?
Question 87
An IS auditor identifies key controls that have been overridden by management. The next step the IS auditor should take is to
Question 88
Which of the following observations should be of GREATEST concern to an IS auditor reviewing a hosted virtualized environment where each guest operating system (OS) is r
Question 89
To ensure efficient and economic use of limited resources in supporting a local area network (LAN) infrastructure, it is advisable to:
Question 90
In an organization that has a staff-rotation policy, the MOST appropriate access control model is: