Question 6
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
Question 7
An organization has outsourced its data leakage monitoring to an Internet service provider (ISP). Which of the following is the BEST way for an IS auditor to determine the effectiveness of this service?
Question 8
Which of the following is a benefit of the DevOps development methodology?
Question 9
Which of the following would BEST enable an IS auditor to perform an audit that requires testing the full population of data?
Question 10
An organization allows its employees to use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?