Question 96

An organization issues digital certificates to employees to enable connectivity to a web-based application.
Which of the following public key infrastructure (PKI) components MUST be included in the application architecture for determining the on-going validity of connections?
  • Question 97

    An IS auditor is reviewing security policies and finds no mention of the return of corporate-owned smartphones upon termination of employment. The GREATEST risk arising from this situation is that unreturned devices:
  • Question 98

    During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed The auditor should FIRST.
  • Question 99

    A database audit reveals an issue with the way data ownership for client data is defined. Which of the following roles should be accountable for this finding?
  • Question 100

    Which of the following is MOST important for an IS auditor to verify when reviewing a critical business application that requires high availability?