An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be
the GREATEST concern?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor
recommend be done
FIRST?
An organization is running servers with critical business applications that are in an area subject to frequent but brief power outages. Knowledge of
which of the following would allow the organization's management to monitor the ongoing adequacy of the uninterruptible power supply (UPS)?