Question 301

Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
  • Question 302

    Which of the following correctly describes the purpose of an Electronic data processing audit?
  • Question 303

    During an application audit, an IS auditor finds several problems related to corrupted data in the database. Which of the following is a corrective control that the IS auditor should recommend?
  • Question 304

    Which of the following MUST be completed as part of the annual audit planning process?
  • Question 305

    An organization recently experienced a phishing attack that resulted in a breach of confidential information.
    Which of the following would be MOST relevant for an IS auditor to review when determining the root cause of the incident?