A trojan horse simply cannot operate autonomously.
A recent audit identified duplicate software licenses and technologies Which of the following would be MOST helpful to prevent this type of duplication in the future?
An IS auditor reviewing an organization's data privacy controls observes that privacy notices do not clearly
state how the organization uses customer data for its processing operations. Which of the following data
protection principles MUST be implemented to address this gap?
After observing suspicious activities in a server, a manager requests a forensic analysis.
Which of the following findings should be of MOST concern to the investigator?
IT help desk statistics show a high number of recurring incidents with known solutions. Which of the following is the BEST IS audit recommendation?