Which of the following is an IS auditor's BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?
Which of the following is best suited for searching for address field duplications?
An organization's IT security policy requires annual security awareness training for all employees. Which of the following would provide the BEST evidence of the training's effectiveness?
Which of the following is a detective control that can be used to uncover unauthorized access to information systems?
Which of the following is the MOST critical element impacting the success of an information security program?