Question 21

An IS auditor assessing the controls within a newly implemented call center would FIRST
  • Question 22

    A perpetrator looking to gain access to and gather information about encrypted data being transmitted over the network would use:
  • Question 23

    What is often the most difficult part of initial efforts in application development?
  • Question 24

    Integer overflow occurs primarily with:
  • Question 25

    Prior to the of acquired software into production, it is MOST important that the IS auditor review the: