Question 26

During a review, an IS auditor notes that an organization's marketing department has purchased a cloud-based software application without following the procurement process. What should the auditor do FIRST?
  • Question 27

    An organization has outsourced its data leakage monitoring to an Internet service provider (ISP). Which of the following is the BEST way for an IS auditor to determine the effectiveness of this service?
  • Question 28

    Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
  • Question 29

    The PRIMARY reason an IS department should analyze past incidents and problems is to:
  • Question 30

    Which of the following attacks would MOST likely result in the interception and modification of traffic for mobile phones connecting to potentially insecure public Wi-Fi networks?