Which of the following IS functions can be performed by the same group or individual while still providing
the proper segregation of duties?
An IS auditor has completed an audit on the organization's IT strategic planning process Which of the following findings should be given the HIGHEST priority?
A company has decided to implement an electronic signature scheme based on public key infrastructure.
The user's private key will be stored on the computer's hard drive and protected by a password. The MOST significant risk of this approach is:
Which of the following tools is MOST helpful in estimating budgets for tasks within a large IT business application project?
When reviewing an organization's data protection practices, an IS auditor should be MOST concerned with a lack of: