IS management has decided to rewrite a legacy customer relations system using fourth generation languages (4GLs). Which of the following risks is MOST often associated with system development using
4GLs?
Which of the following should be reviewed FIRST when planning an IS audit?
What is the PRIMARY objective of performing a vulnerability assessment following a business system
update?
An information systems security officer's PRIMARY responsibility for business process applications is to:
Which of the following would be MOST time and cost efficient when performing a control self-assessment (CSA) for an organization with a large number of widely dispersed employees?