Question 56

When auditing third-party service providers, an IS auditor should be concerned with which of the following?
  • Question 57

    What is an initial step in creating a proper firewall policy?
  • Question 58

    Which of the following is the GREATEST risk associated with vulnerability scanning tools used to identify security weaknesses?
  • Question 59

    During a database security audit, an IS auditor is reviewing the process used to upload source data Which of the following is the MOST significant risk area for the auditor to focus on?
  • Question 60

    During an audit, an IS auditor notes that an organization's business continuity plan (BCP) does not adequately address information confidentiality during a recovery process. The IS auditor should recommend that the plan be modified to include: