Which of the following should an IS auditor use to detect duplicate invoice records within an invoice master f
Which of the following should an IS auditor use to detect duplicate invoice records within an invoice master file?
Which of the following would be the MOST effective audit technique for identifying segregation of duties viola
Which of the following would be the MOST effective audit technique for identifying segregation of duties violations in a new enterprise resource planning (ERP) implementation?
Which of the following would an IS auditor use to determine if unauthorized modifications were made to product
Which of the following would an IS auditor use to determine if unauthorized modifications were made to production programs?
During a change control audit of a production system, an IS auditor finds that the change management process i
During a change control audit of a production system, an IS auditor finds that the change management process is not formally documented and that some migration procedures failed. What should the IS auditor do next?
During the collection of forensic evidence, which of the following actions would MOST likely result in the des
During the collection of forensic evidence, which of the following actions would MOST likely result in the destruction or corruption of evidence on a compromised system?
An IS auditor who was involved in designing an organization-s business continuity plan(BCP) has been assigned
An IS auditor who was involved in designing an organization-s business continuity plan(BCP) has been assigned to audit the plan. The IS auditor should:
An IS auditor conducting a review of software usage and licensing discovers that numerous PCs contain unauthor
An IS auditor conducting a review of software usage and licensing discovers that numerous PCs contain unauthorized software. Which of the following actions should the IS auditor take?
Corrective action has been taken by an auditee immediately after the identification of a reportable finding. T
Corrective action has been taken by an auditee immediately after the identification of a reportable finding. The auditor should:
During an implementation review of a multiuser distributed application, an IS auditor finds minor weaknesses i
During an implementation review of a multiuser distributed application, an IS auditor finds minor weaknesses in three areas-the initial setting of parameters is improperly installed, weak passwords are being used and some vital reports are not being checked properly. While preparing the audit report, the IS auditor should:
During an exit interview, in cases where there is disagreement regarding the impact of a finding, an IS audito
During an exit interview, in cases where there is disagreement regarding the impact of a finding, an IS auditor should: