Question 91
The PRIMARY purpose of a configuration management system is to:
Question 92
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?
Question 93
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Question 94
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
Question 95
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?