Question 31

After an external IS audit, which of the following should be IT management's MAIN consideration when determining the prioritization of follow-up activities?
  • Question 32

    An IS auditor performing a review of a newly purchased software program notes that an escrow agreement has been executed for acquiring the source code. What is MOST important for the IS auditor to verify?
  • Question 33

    Which of the following should be of MOST concern to an IS auditor reviewing the BCP?
  • Question 34

    Which of the following is the MOST important consideration when developing an incident response program?
  • Question 35

    Distributed denial-of-service (DDOS) attacks on Internet sites are typically evoked by hackers using which of the following?