CISA Exam Question 331
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?
CISA Exam Question 332
During the audit of an enterprise resource planning (ERP) system, an IS auditor found an applicationpatch was applied to the production environment. It is MOST important for the IS auditor to verify approval from the:
CISA Exam Question 333
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
CISA Exam Question 334
Which of the following is the MOST important responsibility of data owners when implementing a data classification process?
CISA Exam Question 335
An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process. Which of the following is the MOST appropriate population to sample from when testing for remediation?