Which of the following is the BEST method to safeguard data on an organization's laptop computers?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
To confirm integrity for a hashed message, the receiver should use: