Question 526
Talking about the different approaches to security in computing, the principle of regarding the computer system itself as largely an untrusted system emphasizes:
Question 527
An organization's current end-user computing practices include the use of a spreadsheet for financial statements. Which of the following is the GREATEST concern?
Question 528
Management has agreed to perform multiple remediation actions in response to an audit issue, including the implementation of a new control. Which of the following is the BEST time for an IS auditor to perform an audit follow-up of this issue?
Question 529
Which of the following would an IS auditor consider to be the MOST important to review when conducting a business continuity audit?
Question 530
When auditing a quality assurance plan, an IS auditor should be MOST concerned if the: