Which of the following is MOST likely to be identified from an information systems audit report?
A.
Resiliency
B.
Regulatory requirements
C.
Data ownership
D.
Vulnerabilities
The Answer Is:
D
This question includes an explanation.
Explanation:
Information systems audits are designed to evaluate the effectiveness of controls and identify weaknesses or vulnerabilities within systems. Identifying vulnerabilities allows organizations to address potential security issues proactively.
[Reference:ISACA CRISC Review Manual, 7th Edition, Chapter 4: Information Technology and Security, Section: Information Systems Auditing., , , , , , ]
CRISC PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"