Question 26
Which of the following falls within the scope of an information security governance committee?
Question 27
An appropriate control for ensuring the authenticity of orders received in an EDI application is to:
Question 28
During an implementation review of a multiuser distributed application, an IS auditor finds minor weaknesses in three areas-the initial setting of parameters is improperly installed, weak passwords are being used and some vital reports are not beingchecked properly. While preparing the audit report, the IS auditor should:
Question 29
The FIRST step in establishing a firewall security policy is to determine the:
Question 30
Which of the following provides the evidence that network filters are functioning?
D18912E1457D5D1DDCBD40AB3BF70D5D
D18912E1457D5D1DDCBD40AB3BF70D5D