Question 11

During the collection of forensic evidence, which of the following actions would MOST likely result in the destruction or corruption of evidence on a compromised system?
  • Question 12

    An organization recently experienced a phishing attack that resulted in a breach of confidential information.
    Which of the following would be MOST relevant for an IS auditor to review when determining the root cause of the incident?
  • Question 13

    When reviewing a disaster recovery plan (DRP) an IS auditor should examine the:
  • Question 14

    When reviewing a digital certificate verification process, which of the following findings represents the MOST significant risk?
  • Question 15

    Which of the following BEST enables an IS auditor to detect incorrect exchange rates applied to outward remittance transactions at a financial institution?