Question 141

During an IT operations audit multiple unencrypted backup tapes containing sensitive credit card information cannot be found Which of the following presents the GREATEST risk to the organization?
  • Question 142

    Which of the following is the GREATEST threat to Voice-over Internet Protocol (VoIP) related to privacy?
  • Question 143

    During an audit, the client learns that the IS auditor has recently completed a similar security review at a competitor. The client inquires about the competitor's audit results. What is the BEST way for the auditor to address this inquiry?
  • Question 144

    Which of the following should MOST concern an IS auditor reviewing an intrusion detection system (IDS)?
  • Question 145

    An internal audit department recently established a quality assurance (QA) program as part of its overall audit program. Which of the following activities is MOST important to rlude as part of the QA program requirements?