Question 11
Which of the following is MOST important for an IS auditor to verify when reviewing a critical business application that requires high availability?
Question 12
Which of the following implementation strategies for new applications presents the GREATEST risk during data conversion and migration from an old system to a new system?
Question 13
Which of the following techniques would provide the BEST assurance to an IS auditor that all necessary data has been successfully migrated from a legacy system to a modern platform?
Question 14
Which of the following would provide the BEST evidence of the effectiveness of mandated annual security awareness training?
Question 15
An IS auditor is reviewing security controls related to collaboration to unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?