Question 96

In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
  • Question 97

    During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
  • Question 98

    Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
  • Question 99

    Which of the following is a social engineering attack method?
  • Question 100

    An organizations audit charier PRIMARILY: