An IS auditor observes an organization is performing data backup and restoration testing on an ad hoc basis without a defined process. What is the MOST likely result of a data disruption event?
Which procedure provides the GREATEST assurance that corrective action to an audit report has been taken?
Which of the following biometrics has the highest reliability and lowest false-acceptance rate (FAR)?
In an organization where an IT security baseline has been defined, an IS auditor should FIRST ensure:
During development of an information security policy, which of the following would BEST ensure alignment to business objectives?