what should the IS auditor do FIRST?
During a human resources (HR) audit, an IS auditor is informed that there is a verbal agreement
between the IT and HR departments as to the level of IT services expected. In this situation, what
should the IS auditor do FIRST?
Which of the following procedures would MOST effectively detect the loading of illegal software packages onto
Which of the following procedures would MOST effectively detect the loading of illegal software
packages onto a network?
which of the following should an IS auditor review?
To determine which users can gain access to the privileged supervisory state, which of the following
should an IS auditor review?
Which of the following would an IS auditor consider to be the MOST helpful when evaluating the effectiveness a
Which of the following would an IS auditor consider to be the MOST helpful when evaluating the
effectiveness and adequacy of a computer preventive maintenance program?
Which of the following exposures associated with the spooling of sensitive reports for offline printing should
Which of the following exposures associated with the spooling of sensitive reports for offline
printing should an IS auditor consider to be the MOST serious?
Applying a retention date on a file will ensure that:
Applying a retention date on a file will ensure that:
Which of the following is a network diagnostic tool that monitors and records network information?
Which of the following is a network diagnostic tool that monitors and records network information?
Which of the following will help detect changes made by an intruder to the system log of a server?
Which of the following will help detect changes made by an intruder to the system log of a server?
which of the following findings?
IT operations for a large organization have been outsourced. An IS auditor reviewing the outsourced
operation should be MOST concerned about which of the following findings?
Which of the following BEST ensures the integrity of a server’s operating system?
Which of the following BEST ensures the integrity of a server’s operating system?