A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
An employee loses a mobile device resulting in loss of sensitive corporate dat a. Which o( the following would have BEST prevented data leakage?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
Which of the following is the BEST reason for an IS auditor to emphasize to management the importance of using an IT governance framework?