When performing an IS strategy audit, an IS auditor should review both short-term (one- year) and long-
term (three-to five-year) IS strategies, interview appropriate corporate management personnel, and ensure
that the external environment has been considered. The auditor should especially focus on procedures in
an audit of IS strategy. True or false?
After observing suspicious activities in a server, a manager requests a forensic analysis. Which of the following findings should be of MOST concern to the investigator?
Which of the following is best suited for searching for address field duplications?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
Which of the following virus prevention techniques can be implemented through hardware?