An IS auditor reviewing an information processing environment decides to conduct external penetration testing. Which of the following is MOST
appropriate to include in the audit scope for the organization to distinguish between the auditor's penetration attacks and actual attacks?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that
several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following
should be the auditor’s GREATEST concern with this situation?
During an information security review, an IS auditor learns an organizational policy requires all employees to attend information security training
during the first week of each new year What is the auditor's BEST recommendation to ensure employees hired after January receive adequate
guidance regarding security awareness?