When developing a risk management program, what is the FIRST activity to be performed?
Which of the following key performance indicators (KPIs) provides the BEST indication of a security awareness campaign's effectiveness?
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?
A firm is considering using biometric fingerprint identification on all PCs that access critical datA. This requires:
Which of the following is a MAJOR benefit of using a wireless network?