Question 41

An IS auditor has been asked to perform a post-Implementation assessment of a new corporate human resources (HR) system. Which of the following control areas would be MOST important to review for the protection of employee information?
  • Question 42

    What is the PRIMARY objective of performing a vulnerability assessment following a business system
    update?
  • Question 43

    Which of the following is a mechanism for mitigating risks?
  • Question 44

    Which of the following results in a denial-of-service attack?
  • Question 45

    The MOST significant security concern when using flash memory (e.g., USB removable disk) is that the: