An audit has identified that business units have purchased cloud-based applications without ITs support. What is [he GREATEST risk associated with this situation?
Which of the following is the PRIMARY objective of using a capability maturity model as a tool to communicate audit results to senior management?
An evaluation of an IT department finds that some IT goals do not align with the organization's goals. Which of the following would be the GREATEST impact?
A computer system is no more secure than the human systems responsible for its operation. Malicious
individuals have regularly penetrated well-designed, secure computer systems by taking advantage of the
carelessness of trusted individuals, or by deliberately deceiving them. zombie computers are being
HEAVILY relied upon on by which of the following types of attack?
An IT steering committee should review information systems PRIMARILY to assess: