Which of the following data validation edits is effective in detecting transposition and transcription errors?
Which of the following data validation edits is effective in detecting transposition and transcription errors?
What control detects transmission errors by appending calculated bits onto the end of each segment of data?
What control detects transmission errors by appending calculated bits onto the end of each segment of data?
What process uses test data as part of a comprehensive test of program controls in a continuous online manner?
What process uses test data as part of a comprehensive test of program controls in a continuous online manner?
When a departmental system continues to be out of compliance with an information security policy’s passw
When a departmental system continues to be out of compliance with an information security policy’s password strength requirements, the BEST action to undertake is to:
Which of the following metrics would be the MOST useful in measuring how well information security is monitori
Which of the following metrics would be the MOST useful in measuring how well information security is monitoring violation logs?
To ensure that transactions are not lost during processing, an IS auditor should recommend the inclusion of:
A proposed transaction processing application will have many data capture sources and outputs in paper and electronic form. To ensure that transactions are not lost during processing, an IS auditor should recommend the inclusion of:
Functional acknowledgements are used:
Functional acknowledgements are used:
To reduce the possibility of losing data during processing, the FIRST point at which control totals should be
To reduce the possibility of losing data during processing, the FIRST point at which control totals should be implemented is:
The MOST effective way to ensure that outsourced service providers comply with the organization’s inform
The MOST effective way to ensure that outsourced service providers comply with the organization’s information security policy would be:
The information security manager should:
The IT function has declared that, when putting a new application into production, it is not necessary to update the business impact analysis (BIA) because it does not produce modifications in the business processes. The information security manager should: