Question 91

The PRIMARY purpose of a configuration management system is to:
  • Question 92

    Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?
  • Question 93

    Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
  • Question 94

    An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
  • Question 95

    Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?