Question 196
An IS auditor reviewing a financial organization's identity management solution found thai some critical business applications do not have identified owners. Which of the following should the auditor do NEXT?
Question 197
Which of the following is the BEST indication that an IT service desk function needs to improve its incident management processes?
Question 198
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
Question 199
The objective of concurrency control in a database system is to:
Question 200
Doing which of the following during peak production hours could result in unexpected downtime?