Which of the following findings should give the IS auditor the GREATEST concern?
An IS auditor is evaluating a corporate network for a possible penetration by employees. Which of
the following findings should give the IS auditor the GREATEST concern?
Which of the following is the PRIMARY advantage of using computer forensic software for investigations?
Which of the following is the PRIMARY advantage of using computer forensic software for
investigations?
The next step-confirming whether the imported data are complete-is performed by:
An IS auditor has imported data from the client’s database. The next step-confirming whether the
imported data are complete-is performed by:
Which would be the BEST audit technique to use in this situation?
The vice president of human resources has requested an audit to identify payroll overpayments for
the previous year. Which would be the BEST audit technique to use in this situation?
A) Test data
The IS auditor should:
During a security audit of IT processes, an IS auditor found that there were no documented security
procedures. The IS auditor should:
Next, the IS auditor should:
In the course of performing a risk analysis, an IS auditor has identified threats and
potential impacts. Next, the IS auditor should:
Which of the following should be of MOST concern to an IS auditor?
Which of the following should be of MOST concern to an IS auditor?
Which of the following would normally be the MOST reliable evidence for an auditor?
Which of the following would normally be the MOST reliable evidence for an auditor?
which of the following?
When evaluating the collective effect of preventive, detective or corrective controls within a
process, an IS auditor should be aware of which of the following?
Which audit technique provides the BEST evidence of the segregation of duties in an IS department?
Which audit technique provides the BEST evidence of the segregation of duties in an IS department?