An IS auditor performing a telecommunication access control review should be concerned PRIMARILY with the:
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
Which of the following is the BEST indication to an IS auditor that management's post-implementation review was effective?
Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?
An IS auditor reviewing a high-risk business application has identified the need to strengthen controls for reporting malfunctions to management Which of the following would BEST facilitate timely reporting?