Question 581

An IS auditor is reviewing a bank's service level agreement (SLA) with a third-party provider that hosts the
bank's secondary data center. Which of the following findings should be of GREATEST concern to the
auditor?
  • Question 582

    Which of the following methods should be used to purge confidential data from write-once optical media?
  • Question 583

    On a public-key cryptosystem when there is no previous knowledge between parties, which of the following will BEST help to prevent one person from using a fictitious key to impersonate someone else?
  • Question 584

    Which of the following should be of PRIMARY concern to an IS auditor reviewing the management of external IT service providers?
  • Question 585

    Which of the following procedures would BEST determine whether adequate recovery/restart procedures exist?