Question 131
internal IS auditor recommends that incoming accounts payable payment files be encrypted. Which type of control is the auditor recommending?
Question 132
Which of the following is the PRIMARY reason for an IS auditor to use computer-assisted audit techniques (CAATs)?
Question 133
An IS auditor is planning to audit an organization's infrastructure for access, patching, and change management. Which of the following is the BEST way to prioritize the systems?
Question 134
A client/server configuration will:
Question 135
Which of the following is the GREATEST threat to Voice-over Internet Protocol (VoIP) related to privacy?