Which of the following controls would an IS auditor look for in an environment where duties cannot be appropriately segregated?
A recent audit concluded that an organization's information security system was weak and that monitoring would likely fail to detect penetration. Which of the following would be the MOST appropriate recommendation?
The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of
financial transactions is to ensure:
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
The drives of a tile server are backed up at a hot site. Which of the following is the BEST way to duplicate the files stored on the server for forensic analysis?