Which of the following issues identified during a formal review of an organization's information security policies presents the GREATEST potential risk to the organization?
Answer : C
Which of the following is the BEST approach to help organizations address risks associated with shadow IT?
Answer : A
Which of the following is MOST important for an IS auditor to verify when evaluating tne upgrade of an organization's enterprise resource planning (ERP) application?
Answer : B
Which of the following technologies is BEST suited to fulfill a business requirement for nonrepudiation of business-to-business transactions with external parties without the need for a mutually trusted entity?
Answer : B
Which of the following is the BEST indication that an information security awareness program is effective?
Answer : B
The success rate of social engineering attacks directly measures the behavioral changes resulting from an information security awareness program. Employees who are aware and informed are better equipped to identify and thwart such attacks.
Reduction in Reported Incidents (Option A): This may indicate underreporting rather than program effectiveness.
Reduction in Cost of Maintaining the Program (Option C): This reflects cost efficiency, not program effectiveness.
Reduction in Number of Attacks (Option D): The number of attacks is beyond the control of awareness programs and does not reflect their impact.
Which of the following provides the BEST evidence of effective IT portfolio managements?
Answer : C
Which of the following is the BEST recommendation by an IS auditor to prevent unauthorized access to Internet of Things (loT) devices'?
Answer : C