Question 41

Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
  • Question 42

    An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
  • Question 43

    Which of the following is a social engineering attack method?
  • Question 44

    What is MOST important to verify during an external assessment of network vulnerability?
  • Question 45

    Which audit approach is MOST helpful in optimizing the use of IS audit resources?