Question 31
After an external IS audit, which of the following should be IT management's MAIN consideration when determining the prioritization of follow-up activities?
Question 32
An IS auditor performing a review of a newly purchased software program notes that an escrow agreement has been executed for acquiring the source code. What is MOST important for the IS auditor to verify?
Question 33
Which of the following should be of MOST concern to an IS auditor reviewing the BCP?
Question 34
Which of the following is the MOST important consideration when developing an incident response program?
Question 35
Distributed denial-of-service (DDOS) attacks on Internet sites are typically evoked by hackers using which of the following?