What can be used to help identify and investigate unauthorized transactions?
.What can be used to help identify and investigate unauthorized transactions? Choose the BEST
answer.
True or false?
.Network environments often add to the complexity of program-to-program communication, making
the implementation and maintenance of application systems more difficult. True or false?
Fill in the blanks.
.______________ risk analysis is not always possible because the IS auditor is attempting to
calculate risk using nonquantifiable threats and potential losses. In this event, a ______________
risk assessment is more appropriate. Fill in the blanks.
What must an IS auditor understand before performing an application audit?
.What must an IS auditor understand before performing an application audit? Choose the BEST
answer.
What is the first step in a business process re-engineering project?
.What is the first step in a business process re-engineering project?
what must be done with the data to ensure data completeness?
.When storing data archives off-site, what must be done with the data to ensure data
completeness?
Which of the following can help detect transmission errors by…?
.Which of the following can help detect transmission errors by appending specially calculated bits
onto the end of each segment of data?
What is an edit check to determine whether a field contains valid data?
.What is an edit check to determine whether a field contains valid data?
.A transaction journal provides the information necessary for detecting unauthorized _____________ (fill in th
.A transaction journal provides the information necessary for detecting unauthorized
_____________ (fill in the blank) from a terminal.
True or false?
.An intentional or unintentional disclosure of a password is likely to be evident within control logs.
True or false?