Question 46
When auditing an application change control process, which of the following procedures should be included in the scope of the audit?
1) Ensure system change requests are formally initiated, documented, and approved.
2) Ensure processes are in place to prevent emergency changes from taking place.
3) Ensure changes are adequately tested before being placed into the production environment.
4) Evaluate whether the procedures for program change management are adequate.
Question 47
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations such as copyright or privacy laws?
Question 48
Which of the following IT disaster recovery plans includes a remote site designated for recovery with available space for basic services, such as internet and telecommunications, but does not have servers or infrastructure equipment?
Question 49
Which of the following cybersecurity-related activities is most likely to be performed by the second line of defense?
Question 50
Which of the following statements regarding program change management is not correct?