Question 26

Which of the following falls within the scope of an information security governance committee?
  • Question 27

    An appropriate control for ensuring the authenticity of orders received in an EDI application is to:
  • Question 28

    During an implementation review of a multiuser distributed application, an IS auditor finds minor weaknesses in three areas-the initial setting of parameters is improperly installed, weak passwords are being used and some vital reports are not beingchecked properly. While preparing the audit report, the IS auditor should:
  • Question 29

    The FIRST step in establishing a firewall security policy is to determine the:
  • Question 30

    Which of the following provides the evidence that network filters are functioning?
    D18912E1457D5D1DDCBD40AB3BF70D5D