During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
A penetration test performed as part of evaluating network security:
Cisco IOS based routers perform basic traffic filtering via which of the following mechanisms?
In order to properly protect against unauthorized disclosure of sensitive data, how should hard disks be sanitized?
The optimum business continuity strategy for an entity is determined by the: