When performing a computer forensic investigation, in r…
When performing a computer forensic investigation, in regard to the evidence gathered, an IS
auditor should be MOST concerned with:
What should be the IS auditor’s next step?
While conducting an audit, an IS auditor detects the presence of a virus. What should be the IS
auditor’s next step?
When assessing the design of network monitoring control…
When assessing the design of network monitoring controls, an IS auditor should FIRST review
network:
Which of the following online auditing techniques is mo…
Which of the following online auditing techniques is most effective for the early detection of errors
or irregularities?
which approach would provide the BEST evidence that pur…
In an audit of an inventory application, which approach would provide the BEST evidence that
purchase orders are valid?
An IS auditor performing a review of an application’s c…
An IS auditor performing a review of an application’s controls would evaluate the:
The BEST method of proving the accuracy of a system tax…
The BEST method of proving the accuracy of a system tax calculation is by:
Which of the following would MOST likely be the next st…
An IS auditor evaluates the test results of a modification to a system that deals with payment
computation. The auditor finds that 50 percent of the calculations do not match predetermined
totals. Which of the following would MOST likely be the next step in the audit?
Which of the following is an advantage of an integrated…
Which of the following is an advantage of an integrated test facility (ITF)?
An IS auditor attempting to determine whether access to…
An IS auditor attempting to determine whether access to program documentation is restricted to
authorized persons would MOST likely: