which of the following?
Processing controls ensure that data is accurate and complete, and is processed only through
which of the following? Choose the BEST answer.
which of the following?
Data edits are implemented before processing and are considered which of the following? Choose
the BEST answer.
What is used as a control to detect loss, corruption, o…
What is used as a control to detect loss, corruption, or duplication of data?
________________ (fill in the blank) should be implemen…
________________ (fill in the blank) should be implemented as early as data preparation to
support data integrity at the earliest point possible.
When should an application-level edit check to verify t…
When should an application-level edit check to verify that availability of funds was completed at the
electronic funds transfer (EFT) interface?
True or false?
Whenever business processes have been re-engineered, the IS auditor attempts to identify and
quantify the impact of any controls that might have been removed, or controls that might not work
as effectively after business process changes. True or false?
Fill in the blanks.
Business process re-engineering often results in ______________ automation, which results in
_____________ number of people using technology. Fill in the blanks.
Which of the following exploit vulnerabilities to cause…
Which of the following exploit vulnerabilities to cause loss or damage to the organization and its
assets?
What is the primary security concern for EDI environments?
What is the primary security concern for EDI environments? Choose the BEST answer.
what should be the IS auditor’s next step?
After identifying potential security vulnerabilities, what should be the IS auditor’s next step?