An IS auditor notes that a number of application plug-ins currently in use are no longer supported. Which of the following is the auditor's BEST recommendation to management?
Which of the following is an oft-cited cause of vulnerability of networks?
In an IS auditor's review of an organization's configuration management practices for software, which of the following is MOST important?
A checksum following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
While reviewing similar issues in an organization s help desk system, an IS auditor finds that they were analyzed independently and resolved differently This situation MOST likely indicates a deficiency in: