An IS auditor reviewing a database application discovers that the current configuration does not match the ori
An IS auditor reviewing a database application discovers that the current configuration does not match the originally designed structure. Which of the following should be the IS auditors next action?
A programmer maliciously modified a production program to change data and then restored the original code. Whi
A programmer maliciously modified a production program to change data and then restored the original code. Which of the following would MOST effectively detect the malicious activity?
The purpose of code signing is to provide assurance that:
The purpose of code signing is to provide assurance that:
An IS auditor should recommend the use of library control software to provide reasonable assurance that:
An IS auditor should recommend the use of library control software to provide reasonable assurance that:
An organization has recently installed a security patch, which crashed the production server. To minimize the
An organization has recently installed a security patch, which crashed the production server. To minimize the probability of this occurring again, an IS auditor should:
When reviewing procedures for emergency changes to programs, the IS auditor should verify that the procedures:
When reviewing procedures for emergency changes to programs, the IS auditor should verify that the procedures:
To determine if unauthorized changes have been made to production code the BEST audit procedure is to:
To determine if unauthorized changes have been made to production code the BEST audit procedure is to:
The application systems of an organization using open-source software have no single recognized developer prod
The application systems of an organization using open-source software have no single recognized developer producing patches. Which of the following would be the MOST secure way of updating open-source software?
Which of the following processes should an IS auditor recommend to assist in the recording of baselines for so
Which of the following processes should an IS auditor recommend to assist in the recording of baselines for software releases?
An IS auditor notes that patches for the operating system used by an organization are deployed by the IT depar
An IS auditor notes that patches for the operating system used by an organization are deployed by the IT department as advised by the vendor. The MOST significant concern an IS auditor should have with this practice is the nonconsideration by lT of: