Question 196

An IS auditor reviewing a financial organization's identity management solution found thai some critical business applications do not have identified owners. Which of the following should the auditor do NEXT?
  • Question 197

    Which of the following is the BEST indication that an IT service desk function needs to improve its incident management processes?
  • Question 198

    An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
  • Question 199

    The objective of concurrency control in a database system is to:
  • Question 200

    Doing which of the following during peak production hours could result in unexpected downtime?