What should be the IS auditor’s next step?
While conducting an audit, an IS auditor detects the presence of a virus. What should be the IS
auditor’s next step?
A substantive test to verify that tape library inventory records are accurate is:
A substantive test to verify that tape library inventory records are accurate is:
When performing a computer forensic investigation, in regard to the evidence gathered, an IS auditor should be
When performing a computer forensic investigation, in regard to the evidence gathered, an IS
auditor should be MOST concerned with:
Under these circumstances, the IS auditor should:
An IS auditor interviewing a payroll clerk finds that the answers do not support job descriptions
and documented procedures. Under these circumstances, the IS auditor should:
The IS auditor has failed to exercise:
An IS auditor issues an audit report pointing out the lack of firewall protection features at the
perimeter network gateway and recommends a vendor product to address this vulnerability. The
IS auditor has failed to exercise:
The PRIMARY reason an IS auditor performs a functional walkthrough during the preliminary phase of an audit as
The PRIMARY reason an IS auditor performs a functional walkthrough during the preliminary
phase of an audit assignment is to:
In the process of evaluating program change controls, an IS auditor would use source code comparison software
In the process of evaluating program change controls, an IS auditor would use source code
comparison software to:
The PRIMARY purpose for meeting with auditees prior to formally closing a review is to:
The PRIMARY purpose for meeting with auditees prior to formally closing a review is to:
Which of the following audit techniques would BEST aid an auditor in determining whether there have been unaut
Which of the following audit techniques would BEST aid an auditor in determining whether there
have been unauthorized program changes since the last authorized program update?
In this situation, the IS auditor should:
Though management has stated otherwise, an IS auditor has reasons to believe that the
organization is using software that is not licensed. In this situation, the IS auditor should: