When designing metrics for information security, the MOST important consideration is that the metrics:
An organization's software develops need access to personally identifiable information (PII) stored in a
particular data format. Which of the following would be the BEST way to protect this sensitive information
while allowing the developers to use it in development and test environments?
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
Which of ihe following is the BEST way to control scope creep during application system development?
An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?