Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Cross-site scripting (XSS) attacks are BEST prevented through:
Which of the following is an audit reviewer's PRIMARY role with regard to evidence?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?