Which of the following refers to any authentication protocol that requires two independent ways to establish identity and privileges?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
Which of the following is a technique that could be used to capture network user passwords?
An IS auditor reviewing digital rights management (DRM) applications should expect to find an extensive use for which of the following technologies?
Which of the following is the MOST important IS audit consideration when an organization outsources a customer credit review system to a third-party service provider? The provider: