Question 186

An IS auditor issues an audit report pointing out the lack of firewall protection features at the perimeter network gateway and recommends a vendor product to address this vulnerability. The IS auditor has failed to exercise:
  • Question 187

    Which of the following processes BEST addresses the risk associated with the deployment of a new production system?
  • Question 188

    Which of the following findings would be of GREATEST concern when auditing an organization's end-user computing (EUC)?
  • Question 189

    Who is responsible for the overall direction, costs, and timetables for systems-development projects?
  • Question 190

    During an audit of an organizations intranet, it is discovered that users are not deleting their local web Browser caches on a regular basis This practice will result In the risk of disclosure of information