A company recently purchased a sizeable amount of equipment…

A company recently purchased a sizeable amount of equipment for its manufacturing process. It needs to properly report these expenditures so the financial statements are accurate. It calls upon the services of financial auditors. While financial auditors might consider the completeness of the data, the company might also involve IT auditors to examine the underlying technology that captures, records, and calculates the financial results. What process is this company using to address its concerns?

The NIST SP 800-53, “Recommended Security Controls for Feder…

The NIST SP 800-53, “Recommended Security Controls for Federal Information Systems,” was written using a popular risk management approach. Which of the following control areas best fits this description: “This is the area in which information and information system flaws are identified, reported, and corrected in a timely manner”?

In April 2018, an attacker gained access to the NASA Jet Pro…

In April 2018, an attacker gained access to the NASA Jet Propulsion Laboratory by targeting an unauthorized Raspberry Pi. The Raspberry Pi attack went undetected for 10 months. The perpetrator stole approximately 500 megabytes of data. To which of the following causes was this successful attack attributed?