An IS auditor attempting to determine whether access to…
An IS auditor attempting to determine whether access to program documentation is restricted to authorized
persons would MOST likely:
Which of the following is a user feature the IS auditor…
An IS auditor is performing an audit of a network operating system. Which of the following is a user feature the
IS auditor should review?
An IS auditor reviews an organizational chart PRIMARILY for:
An IS auditor reviews an organizational chart PRIMARILY for:
Which of the following forms of evidence for the audito…
Which of the following forms of evidence for the auditor would be considered the MOST reliable?
Data flow diagrams are used by IS auditors to:
Data flow diagrams are used by IS auditors to:
An integrated test facility is considered a useful audi…
An integrated test facility is considered a useful audit tool because it:
Which of the following would be the BEST population to …
Which of the following would be the BEST population to take a sample from when testing program changes?
To determine the extent of the duplication, the IS audi…
During a review of a customer master file, an IS auditor discovered numerous customer name duplications
arising from variations in customer first names. To determine the extent of the duplication, the IS auditor would
use:
Which audit technique provides the BEST evidence of the…
Which audit technique provides the BEST evidence of the segregation of duties in an IS department?
which of the following?
When evaluating the collective effect of preventive, detective or corrective controls within a process, an IS
auditor should be aware of which of the following?