Question 86

Which of the following should an IS auditor validate FIRST when reviewing the security of an organization's IT infrastructure as it relates to Internet of Things (loT) devices?
  • Question 87

    An organization has outsourced its data leakage monitoring to an Internet service provider (ISP). Which of the following is the BEST way for an IS auditor to determine the effectiveness of this service?
  • Question 88

    Which of the following is the BEST approach to identify whether a vulnerability is actively being exploited?
  • Question 89

    Which of the following is an objective of data transfer controls?
  • Question 90

    During an audit of an access control system an IS auditor finds that RFID card readers are not connected via the network to a central server Which of the following is the GREATEST risk associated with this finding?