Question 136

An IS auditor is assessing risk associated with peer-to-peer file sharing within an organization. Which of the following should be of GREATEST concern?
  • Question 137

    In an IS auditor's review of an organization's configuration management practices for software, which of the following is MOST important?
  • Question 138

    Which of the following are designed to detect network attacks in progress and assist in post- attack
    forensics?
  • Question 139

    Which of the following activities provides an IS auditor with the insight regarding potential single person dependencies that might exist withing the organization?
  • Question 140

    Which of the following would provide the BEST evidence of successfully completed batch uploads?