Question 531
Which of the following is the MOST important aspect of an information security policy approved by the board of directors?
Question 532
An employee loses a mobile device resulting in loss of sensitive corporate data. Which of the following would have BEST prevented data leakage?
Question 533
Which of the following is the MOST appropriate testing approach when auditing a daily data flow between two systems via an automated interface to confirm that it is complete and accurate?
Question 534
An organization is using an enterprise resource management (ERP) application. Which of the following would be an effective access control?
Question 535
Which of the following should be an IS auditor's PRIMARY focus when auditing the implementation of a new IT operations performance monitoring system?