When reviewing the security policy, the information system auditor found that there was no mention that the employee should return all the company's smartphones once the employment relationship was terminated.

 When reviewing the security policy, the information system auditor found that there was no mention that the employee should return all the company's smartphones once the employment relationship was terminated. The biggest risk caused by this situation is the unreturned equipment:A . Access to company resourcesB . The inventory...

December 29, 2018 No Comments READ MORE +

 Which of the following should be considered when an information system auditor considers the risks associated with sensitive reporting by offline printing?

 Which of the following should be considered when an information system auditor considers the risks associated with sensitive reporting by offline printing?A . Data may be easily modified by unauthorized personnelB . An unauthorised copy of the report can be printedC . Operators can easily read dataD . If...

December 29, 2018 No Comments READ MORE +

 Which of the following can provide the fastest secure backup for companies that process large amounts of data?

 Which of the following can provide the fastest secure backup for companies that process large amounts of data?A . Hardware encryptionB . Source encryptionC . Symmetric encryptionD . Software encryptionView AnswerAnswer: C

December 28, 2018 No Comments READ MORE +

Which of the following should the information system auditor review to assess whether to maximize the use of storage and networking?

 An enterprise deployed data storage hardware. Which of the following should the information system auditor review to assess whether to maximize the use of storage and networking?A . Capacity management planB . Daily and non-daily work schedulesC . Downtime statisticsD . Quality Management SystemView AnswerAnswer: A

December 27, 2018 No Comments READ MORE +

Which of the following is the best way to reduce the direct risks associated with using an unsupported version of the software?

 Information systems auditors have found that software systems that are still in use are outdated for years and are no longer supported. The auditee stated that it still takes six months for the software to run on the current version. Which of the following is the best way to...

December 18, 2018 No Comments READ MORE +

 In order to develop a robust data security program, the first step you should take is:

 In order to develop a robust data security program, the first step you should take is:A . Talk to the senior management level of IC . Implement monitoring controls.D . Implement data loss prevention measuresE . Perform inventory of assetsView AnswerAnswer: D

December 16, 2018 No Comments READ MORE +

 Which of the following best reflects the mature strategic planning process?

 Which of the following best reflects the mature strategic planning process?A . Strategic planning includes specifications for control and safeguard mechanismsB . All projects have an action plan that includes IT requirementsC . IT strategic planning supports corporate strategyD . IT projects from strategic planning are approved by managementView...

December 15, 2018 No Comments READ MORE +

 The overall progress report for the project indicates that the project is proceeding as planned. However, progress reports from project grouping do not support this.

 The overall progress report for the project indicates that the project is proceeding as planned. However, progress reports from project grouping do not support this. The biggest risk from this situation may be:A . The project may not be completed in the safe periodB . User involvement may be...

December 1, 2018 No Comments READ MORE +

Which of the following questions should be the biggest concern?

 During the physical security audit, the information system auditor received a contactless proximity card that allowed to access to three specific floors of the corporate office building. Which of the following questions should be the biggest concern?A . In the first two days of field work of audit, the...

November 28, 2018 No Comments READ MORE +

 Which of the following recommendations should the information system auditor propose to reduce the likelihood of intruders using social engineering?

 Which of the following recommendations should the information system auditor propose to reduce the likelihood of intruders using social engineering?A . Deploy a security awareness training programB . Perform a simulated attackC . Implementing an intrusion detection system (IDS)D . Prohibit the use of social networking platformsView AnswerAnswer: A

November 27, 2018 No Comments READ MORE +