Question 56
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
Question 57
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
Question 58
A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
Question 59
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simulation test administered for staff members?
Question 60
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?