When assessing the design of network monitoring controls, an IS auditor should FIRST review network:
When assessing the design of network monitoring controls, an IS auditor should FIRST review
network:
What should be the IS auditor’s next step?
While conducting an audit, an IS auditor detects the presence of a virus. What should be the IS
auditor’s next step?
A substantive test to verify that tape library inventory records are accurate is:
A substantive test to verify that tape library inventory records are accurate is:
When performing a computer forensic investigation, in regard to the evidence gathered, an IS auditor should be
When performing a computer forensic investigation, in regard to the evidence gathered, an IS
auditor should be MOST concerned with:
Under these circumstances, the IS auditor should:
An IS auditor interviewing a payroll clerk finds that the answers do not support job descriptions and
documented procedures. Under these circumstances, the IS auditor should:
The IS auditor has failed to exercise:
An IS auditor issues an audit report pointing out the lack of firewall protection features at the
perimeter network gateway and recommends a vendor product to address this vulnerability. The IS
auditor has failed to exercise:
The PRIMARY reason an IS auditor performs a functional walkthrough during the preliminary phase of an audit as
The PRIMARY reason an IS auditor performs a functional walkthrough during the preliminary phase
of an audit assignment is to:
In the process of evaluating program change controls, an IS auditor would use source code comparison software
In the process of evaluating program change controls, an IS auditor would use source code
comparison software to:
The PRIMARY purpose for meeting with auditees prior to formally closing a review is to:
The PRIMARY purpose for meeting with auditees prior to formally closing a review is to:
Which of the following audit techniques would BEST aid an auditor in determining whether there have been unaut
Which of the following audit techniques would BEST aid an auditor in determining whether there
have been unauthorized program changes since the last authorized program update?