An IS auditor reviewing an information processing environment decides to conduct external penetration testing. Which of the following is MOST appropriate to include in the audit scope for the organization to distinguish between the auditor's penetration attacks and actual attacks?
FAGFUR
5 months, 1 week agoStaanlee
1 year, 3 months ago