What process uses test data as part of a comprehensive test of program controls…?
What process uses test data as part of a comprehensive test of program controls in a continuous
online manner?
Which of the following data validation edits is effective in detecting transposition and transcription errors?
Which of the following data validation edits is effective in detecting transposition and transcription
errors?
Which of the following is the GREATEST risk when implementing a data warehouse?
Which of the following is the GREATEST risk when implementing a data warehouse?
Which of the following will BEST ensure the successful offshore development of business applications?
Which of the following will BEST ensure the successful offshore development of business
applications?
Which of the following is the GREATEST risk to the effectiveness of application system controls?
Which of the following is the GREATEST risk to the effectiveness of application system controls?
The MAIN purpose of a transaction audit trail is to:
The MAIN purpose of a transaction audit trail is to:
An appropriate control for ensuring the authenticity of orders received in an EDI application is to:
An appropriate control for ensuring the authenticity of orders received in an EDI application is to:
Which of the following would BEST meet these objectives?
A manufacturing firm wants to automate its invoice payment system. Objectives state that the
system should require considerably less time for review and authorization and the system should be
capable of identifying errors that require follow up. Which of the following would BEST meet these
objectives?
The software quality process MOST recently added by the organization is:
An IS auditor is told by IS management that the organization has recently reached the highest level
of the software capability maturity model (CMM). The software quality process MOST recently
added by the organization is:
The IS auditor should FIRST:
During the audit of an acquired software package, an IS auditor learned that the software purchase
was based on information obtained through the Internet, rather than from responses to a request
for proposal (RFP). The IS auditor should FIRST: