Question 41
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
Question 42
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
Question 43
Which of the following is a social engineering attack method?
Question 44
What is MOST important to verify during an external assessment of network vulnerability?
Question 45
Which audit approach is MOST helpful in optimizing the use of IS audit resources?