Question 6

Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
  • Question 7

    Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
  • Question 8

    An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
  • Question 9

    A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor's GREATEST concern?
  • Question 10

    Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?