An IS audit team is evaluating the documentation related to the most recent application user-access review
performed by IT and business management. It is determined the user list was not system-generated.
Which of the following should be the GREATEST concern?
When reviewing user access to an application containing sensitive company data, which of the following should be the GREATEST concern with regard to segregation of duties?
Which of the following will identify a deviation in the information security management process from generally accepted standards of good practices?
Which of me following is MOST important to ensure that electronic evidence corrected during a forensic investigation will be admissible m future legal proceedings?
During the requirements definition phase of a software development project, the aspects of software testing
that should be addressed are developing: