Which of the following is the MOST important action in recovering from a cyberattack?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of
transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate
vendor payments exist?
The database administrator (DBA) suggests that DB efficiency can be improved by denormalizing some
tables. This would result in:
An IS auditor is reviewing database log settings and notices that only INSERT and DELETE operations are being monitored in the database. What is the MOST significant risk?
During an audit of a disaster recovery plan (DRP) for a critical business area, an IS auditor finds that not all critical systems are covered. What should the auditor do NEXT?