Which of the following would MOST effectively detect th…
A programmer maliciously modified a production program to change data and then restored the
original code. Which of the following would MOST effectively detect the malicious activity?
Which of the following should be the IS auditor’s next …
An IS auditor reviewing a database application discovers that the current configuration does not
match the originally designed structure. Which of the following should be the IS auditor’s next action?
Which of the following tests performed by an IS auditor…
Which of the following tests performed by an IS auditor would be the MOST effective in determining
compliance with an organization’s change control procedures?
which of the following would be considered an adequate …
An IS auditor reviewing database controls discovered that changes to the database during normal
working hours were handled through a standard set of procedures. However, changes made after
normal hours required only an abbreviated number of steps. Inthis situation, which of the following
would be considered an adequate set of compensating controls?
In regard to moving an application program from the tes…
In regard to moving an application program from the test environment to the production
environment, the BEST control would be to have the:
Change management procedures are established by IS mana…
Change management procedures are established by IS management to:
Which of the following controls would be MOST effective…
Which of the following controls would be MOST effective in ensuring that production source code
and object code are synchronized?
Which of the following should an IS auditor recommend i…
Vendors have released patches fixing security flaws in their software. Which of the following should
an IS auditor recommend in this situation?
Which of the following should the IS auditor recommend?
In a small organization, an employee performs computer operations and, when the situation
demands, program modifications. Which of the following should the IS auditor recommend?
The IS auditor should:
While reviewing the IT infrastructure, an IS auditor notices that storage resources are continuously
being added. The IS auditor should: