To mitigate the risk of exposing data through application programming interface (API) queries, which of the following design considerations is MOST important?
Which of the following validation techniques would BEST prevent duplicate electronic vouchers?
A legacy application is running on an operating system that is no longer supported by the vendor.
If the organization continues to use the current application, which of the following should be the IS auditor's GREATEST concern?
An advantage of a continuous audit approach is that it can improve system security when used in time- sharing environments that process a large number of transactions. True or false?
When reviewing IS strategies, an IS auditor can BEST assess whether IS strategy supports the organizations' business objectives by determining if IS: