During an exit interview, in cases where there is disag…
During an exit interview, in cases where there is disagreement regarding the impact of a finding,
an IS auditor should:
While preparing the audit report, the IS auditor should:
During an implementation review of a multiuser distributed application, an IS auditor finds minor
weaknesses in three areas-the initial setting of parameters is improperly installed, weak passwords
are being used and some vital reports are not beingchecked properly. While preparing the audit
report, the IS auditor should:
The auditor should:
Corrective action has been taken by an auditee immediately after the identification of a reportable
finding. The auditor should:
Which of the following actions should the IS auditor take?
An IS auditor conducting a review of software usage and licensing discovers that numerous PCs
contain unauthorized software. Which of the following actions should the IS auditor take?
The IS auditor should:
An IS auditor who was involved in designing an organization’s business continuity plan (BCP) has
been assigned to audit the plan. The IS auditor should:
which of the following actions would MOST likely result…
During the collection of forensic evidence, which of the following actions would MOST likely result
in the destruction or corruption of evidence on a compromised system?
What should the IS auditor do next?
During a change control audit of a production system, an IS auditor finds that the change
management process is not formally documented and that some migration procedures failed. What
should the IS auditor do next?
Which of the following would an IS auditor use to deter…
Which of the following would an IS auditor use to determine if unauthorized modifications were
made to production programs?
Which of the following would be the MOST effective audi…
Which of the following would be the MOST effective audit technique for identifying segregation of
duties violations in a new enterprise resource planning (ERP) implementation?
Which of the following should an IS auditor use to dete…
Which of the following should an IS auditor use to detect duplicate invoice records within an invoice
master file?