Question 541
An IS auditor is evaluating the completeness of privacy procedures involving personally identifiable
information (PII). Which of the following is MOST important for the auditor to verify is included in the
procedures?
information (PII). Which of the following is MOST important for the auditor to verify is included in the
procedures?
Question 542
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
Question 543
If a programmer has update access to a live system, IS auditors are more concerned with the programmer's ability to initiate or modify transactions and the ability to access production than with the programmer's ability to authorize transactions. True or false?
Question 544
Which of the following would MOST effectively reduce social engineering incidents?
Question 545
An intentional or unintentional disclosure of a password is likely to be evident within control logs. True or false?