Question 56
When auditing third-party service providers, an IS auditor should be concerned with which of the following?
Question 57
What is an initial step in creating a proper firewall policy?
Question 58
Which of the following is the GREATEST risk associated with vulnerability scanning tools used to identify security weaknesses?
Question 59
During a database security audit, an IS auditor is reviewing the process used to upload source data Which of the following is the MOST significant risk area for the auditor to focus on?
Question 60
During an audit, an IS auditor notes that an organization's business continuity plan (BCP) does not adequately address information confidentiality during a recovery process. The IS auditor should recommend that the plan be modified to include: