Question 206
Which of the following should be an IS auditor's PRIMARY focus when evaluating the response process for cyber crimes?
Question 207
An audit report that specifies responsibility for the closure of noncompliance issues is BEST enhanced by including:
Question 208
During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?
Question 209
Which of the following is a substantive test procedure?
Question 210
An organization's IT security policy states that user ID's must uniquely identify individual's and that user should not disclose their passwords. An IS auditor discovers that several generic user ID's are being used. Which of the following is the MOST appropriate course of action for the auditor/