Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organizations information security policy?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
Which of the following is the GREATEST risk associated with storing customer data on a web server?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?