Which of the following recommendations by an IS auditor is the BEST control to protect an organization's corporate network from the guest wireless network?
In the process of evaluating program change controls, an IS auditor would use source code comparison software to:
When auditing a proxy-based firewall, an IS auditor should:
During the planning stage of a compliance audit an IS auditor discovers that a bank's Inventory of compliance requirements does not include recent regulatory changes related to managing data risk. What should the auditor do FIRST?
When auditing security for a data center, an IS auditor should look for the presence of a voltage regulator to ensure that the: