CISA Exam Question 556
Naming conventions for system resources are important for access control because they:
CISA Exam Question 557
An IS auditor has discovered that unauthorized customer management software was installed on a workstation.
The auditor determines the software has been uploading customer ita to an external party. Which of the following is the IS auditor's BEST course of action?
The auditor determines the software has been uploading customer ita to an external party. Which of the following is the IS auditor's BEST course of action?
CISA Exam Question 558
A benefit of open system architecture is that it:
CISA Exam Question 559
Which of the following would be the MOST significant consideration when developing a data classification program for a multinational organization?
CISA Exam Question 560
At a hospital, medical personal carry handheld computers which contain patient health datA. These handheld computers are synchronized with PCs which transfer data from a hospital database. Which of the following would be of the most importance?