which of the following would be considered an adequate set of compensating controls?
An IS auditor reviewing database controls discovered that changes to the database during normal
working hours were handled through a standard set of procedures. However, changes made after
normal hours required only an abbreviated number of steps. Inthis situation, which of the following
would be considered an adequate set of compensating controls?
Which of the following tests performed by an IS auditor would be the MOST effective in determining compliance
Which of the following tests performed by an IS auditor would be the MOST effective in determining
compliance with an organization’s change control procedures?
Which of the following should be the IS auditor’s next action?
An IS auditor reviewing a database application discovers that the current configuration does not
match the originally designed structure. Which of the following should be the IS auditor’s next
action?
Which of the following would MOST effectively detect the malicious activity?
A programmer maliciously modified a production program to change data and then restored the
original code. Which of the following would MOST effectively detect the malicious activity?
The purpose of code signing is to provide assurance that:
The purpose of code signing is to provide assurance that:
An IS auditor should recommend the use of library control software to provide reasonable assurance that:
An IS auditor should recommend the use of library control software to provide reasonable assurance
that:
To minimize the probability of this occurring again, an IS auditor should:
An organization has recently installed a security patch, which crashed the production server. To
minimize the probability of this occurring again, an IS auditor should:
When reviewing procedures for emergency changes to programs, the IS auditor should verify that the procedures:
When reviewing procedures for emergency changes to programs, the IS auditor should verify that
the procedures:
To determine if unauthorized changes have been made to production code the BEST audit procedure is to:
To determine if unauthorized changes have been made to production code the BEST audit procedure
is to:
Which of the following would be the MOST secure way of updating open-source software?
The application systems of an organization using open-source software have no single recognized
developer producing patches. Which of the following would be the MOST secure way of updating
open-source software?