Question 196
Which of the following is the GREATEST benefit of utilizing data analytics?
Question 197
When reviewing backup policies, an IS auditor MUST verify that backup intervals of critical systems do not exceed which of the following?
Question 198
Which of the following should be the PRIMARY consideration for IT management when selecting a new information security tool that monitors suspicious file access patterns?
Question 199
Which of the following is a directive control?
Question 200
During an audit of an access control system an IS auditor finds that RFID card readers are not connected via the network to a central server Which of the following is the GREATEST risk associated with this finding?