A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?