Which of the following should be an IS auditor's PRIMARY consideration when reviewing a project to outsource data center hosting services?
An organization is using an enterprise resource management (ERP) application. Which of the following would be an effective access control?
During audit follow-up, an IS auditor finds that a control has been implemented differently than
recommended. The auditor should:
Which of the following processes should an IS auditor recommend to assist in the
recording of baselines for software releases?
An IS auditor can BEST help management fulfill risk management responsibilities by: