Which of the following is the first step an internal audit activity should undertake when executing a data analytics process?
Which of the following is the best example of IT governance controls?
Which of the following best describes a detective control designed to protect an organization from cyberthreats and attacks?
Which of the following IT operational areas is responsible for the integrity of data flow within an
organization?