An IS auditor reviewing the outsourced operation should be MOST concerned about which of the following findings?
Which of the following exposures associated with the spooling of sensitive reports for offline printing should an IS auditor consider to be the MOST serious?
Which of the following would an IS auditor consider to be the MOST helpful when evaluating the effectiveness and adequacy of a computer preventive maintenance program?
To determine which users can gain access to the privileged supervisory state, which of the following should an IS auditor review?
Which of the following procedures would MOST effectively detect the loading of illegal software packages onto a network?