Question 131

internal IS auditor recommends that incoming accounts payable payment files be encrypted. Which type of control is the auditor recommending?
  • Question 132

    Which of the following is the PRIMARY reason for an IS auditor to use computer-assisted audit techniques (CAATs)?
  • Question 133

    An IS auditor is planning to audit an organization's infrastructure for access, patching, and change management. Which of the following is the BEST way to prioritize the systems?
  • Question 134

    A client/server configuration will:
  • Question 135

    Which of the following is the GREATEST threat to Voice-over Internet Protocol (VoIP) related to privacy?