During an external assessment of network vulnerability, which of the following activities should be performed FIRST?
.Off-site data backup and storage should be geographically separated so as to ________________ (fill in the blank) the risk of a widespread physical disaster such as a hurricane or earthquake.
An IS auditor notes that nightly hatch processing is frequently incomplete for an application. The auditor should FIRST review controls over which of the following?
During a review of a customer master file, an IS auditor discovered numerous customer name duplications arising from variations in customer first names. To determine the extent of the duplication, the IS auditor would use:
What should be done to determine the appropriate level of audit coverage for an organization's IT environment?