which of the following?
Processing controls ensure that data is accurate and complete, and is processed only through which of the
following? Choose the BEST answer.
which of the following?
Data edits are implemented before processing and are considered which of the following? Choose the
BEST answer.
What is used as a control to detect loss, corruption, o…
What is used as a control to detect loss, corruption, or duplication of data?
________________ (fill in the blank) should be implemen…
________________ (fill in the blank) should be implemented as early as data preparation to support data
integrity at the earliest point possible.
When should an application-level edit check to verify t…
When should an application-level edit check to verify that availability of funds was completed at the electronic
funds transfer (EFT) interface?
True or false?
Whenever business processes have been re-engineered, the IS auditor attempts to identify and quantify the
impact of any controls that might have been removed, or controls that might not work as effectively after
business process changes. True or false?
Fill in the blanks.
Business process re-engineering often results in ______________ automation, which results in
_____________ number of people using technology. Fill in the blanks.
Which of the following exploit vulnerabilities to cause…
Which of the following exploit vulnerabilities to cause loss or damage to the organization and its assets?
What is the primary security concern for EDI environments?
What is the primary security concern for EDI environments? Choose the BEST answer.
what should be the IS auditor’s next step?
After identifying potential security vulnerabilities, what should be the IS auditor’s next step?