00:00

QUESTION 31

- (Exam Topic 4)
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?

Correct Answer: B

QUESTION 32

- (Exam Topic 1)
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?

Correct Answer: B

QUESTION 33

- (Exam Topic 1)
To confirm integrity for a hashed message, the receiver should use:

Correct Answer: A

QUESTION 34

- (Exam Topic 1)
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?

Correct Answer: B

QUESTION 35

- (Exam Topic 4)
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?

Correct Answer: B