An IS auditor is assessing an organization's implementation of a virtual network. Which of the following observations should be considered the MOST significant risk?
A major portion of what is required to address nonrepudiation is accomplished through the use of:
When evaluating the management practices at a third-party organization providing outsourced services, the IS auditor considers relying on an independent auditors report. The IS auditor.....
An IS auditor issues an audit report pointing out the lack of firewall protection features at the perimeter network gateway and recommends a vendor product to address this vulnerability. The IS auditor has failed to exercise:
What would be of GREATEST concern to an IS auditor observing shared key cards being utilized to access an organization's data center?