CISA Exam Question 506

An IS auditor learns that a business owner violated the organization's security policy by creating a web page with access to production data. The auditor's NEXT step should be to:
  • CISA Exam Question 507

    Which of the following is the BEST method to delete sensitive information from storage media that will be reused?
  • CISA Exam Question 508

    When reviewing hard disk utilization reports, an IS auditor observes that utilization is routinely above 95%.
    Which of the following should be the GREATEST concern to the IS auditor?
  • CISA Exam Question 509

    Which of the following is the PRIMARY purpose of a rollback plan for a system change?
  • CISA Exam Question 510

    If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?