Following a recent internal data breach, an IS auditor was asked to evaluate information security practices within the organization. Which of the following findings would be MOST important to report to senior management?
Which of the following provides the BEST assurance of data integrity after file transfers?
An IS auditor notes that IDS log entries related to port scanning are not being analyzed. This lack of analysis will MOST likely increase the risk of success of which of the following attacks?
Which of the following management decisions presents the GREATEST risk associated with data leakage?
Which of the following would be of GREATEST concern to an IS auditor reviewing backup and recovery controls?