Question 526

Talking about the different approaches to security in computing, the principle of regarding the computer system itself as largely an untrusted system emphasizes:
  • Question 527

    An organization's current end-user computing practices include the use of a spreadsheet for financial statements. Which of the following is the GREATEST concern?
  • Question 528

    Management has agreed to perform multiple remediation actions in response to an audit issue, including the implementation of a new control. Which of the following is the BEST time for an IS auditor to perform an audit follow-up of this issue?
  • Question 529

    Which of the following would an IS auditor consider to be the MOST important to review when conducting a business continuity audit?
  • Question 530

    When auditing a quality assurance plan, an IS auditor should be MOST concerned if the: