Which of the following is the MOST robust method for disposing of magnetic media that contains confidential information?
An IS auditor is reviewing an artificial intelligence (Al) and expert system application. The system has produced several critical errors with severe impact. Which of the following should the IS auditor do NEXT to understand the cause of the errors?
A start-up organization is expecting to leverage application components provided by different software vendors and to scale up rapidly. Which of the following enterprise IT architectures would BEST ensure that the organization can easily add and reuse components to deliver its own services?
The information security policy that states 'each individual must have their badge read at every controlled
door' addresses which of the following attack methods?
During a disaster recovery test, an IS auditor observes that the performance of the
disaster recovery site's server is slow. To find the root cause of this, the IS auditor should FIRST review the: