When should an application-level edit check to verify t…
When should an application-level edit check to verify that availability of funds was completed at the
electronic funds transfer (EFT) interface?
True or false?
Whenever business processes have been re-engineered, the IS auditor attempts to identify and
quantify the impact of any controls that might have been removed, or controls that might not work
as effectively after business process changes. True or false?
Fill in the blanks.
Business process re-engineering often results in ______________ automation, which results in
_____________ number of people using technology. Fill in the blanks.
Which of the following exploit vulnerabilities to cause…
Which of the following exploit vulnerabilities to cause loss or damage to the organization and its
assets?
What is the primary security concern for EDI environments?
What is the primary security concern for EDI environments? Choose the BEST answer.
what should be the IS auditor’s next step?
After identifying potential security vulnerabilities, what should be the IS auditor’s next step?
which of the following?
Authentication techniques for sending and receiving data between EDI systems is crucial to prevent
which of the following? Choose the BEST answer.
which applications in an integrated systems environment?
Input/output controls should be implemented for which applications in an integrated systems
environment?
what often results in the greatest negative impact on t…
Above almost all other concerns, what often results in the greatest negative impact on the
implementation of new application software?
When should plans for testing for user acceptance be pr…
When should plans for testing for user acceptance be prepared? Choose the BEST answer.