Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
In an online application, which of the following would provide the MOST information about the transaction audit trail?
Following an unauthorized disclosure of data, an organization needs to implement data loss prevention (DLP) measures. The IS auditor's BEST recommendation should be to:
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
Which of the following is MOST important for the IS auditor to verify when reviewing the development
process of a security policy?