Question 141
During an IT operations audit multiple unencrypted backup tapes containing sensitive credit card information cannot be found Which of the following presents the GREATEST risk to the organization?
Question 142
Which of the following is the GREATEST threat to Voice-over Internet Protocol (VoIP) related to privacy?
Question 143
During an audit, the client learns that the IS auditor has recently completed a similar security review at a competitor. The client inquires about the competitor's audit results. What is the BEST way for the auditor to address this inquiry?
Question 144
Which of the following should MOST concern an IS auditor reviewing an intrusion detection system (IDS)?
Question 145
An internal audit department recently established a quality assurance (QA) program as part of its overall audit program. Which of the following activities is MOST important to rlude as part of the QA program requirements?