The alerting, monitoring and life-cycle management of security related events is typically handled by the
Dataflow diagrams are used by IT auditors to:
An organization has implemented a change management process for all changes to the IT production environment. This change management process follows best practices and is expected to help stabilize the availability and integrity of the organization’s IT environment. Which of the following can be used to measure the effectiveness of this newly implemented process:
The patching and monitoring of systems on a consistent schedule is required by?
Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?
Risk that remains after risk mitigation is known as
When working in the Payment Card Industry (PCI), how often should security logs be review to comply with the standards?
Which of the following is a benefit of a risk-based approach to audit planning?
Your IT auditor is reviewing significant events from the previous year and has identified some procedural oversights. Which of the following would be the MOST concerning?
Information security policies should be reviewed: