This is an example of:
An existing system is being extensively enhanced by extracting and reusing design and program components.
This is an example of:
which of the following is the MOST important thing to v…
When reviewing an organization’s approved software product list, which of the following is the MOST important
thing to verify?
When evaluating the controls of an EDI application, an …
When evaluating the controls of an EDI application, an IS auditor should PRIMARILY be concerned with the
risk of:
The BEST response the auditor can make is to:
An IS auditor reviewing an accounts payable system discovers that audit logs are not being reviewed. When
this issue is raised with management the response is that additional controls are not necessary becauseeffective system access controls are in place. The BEST response the auditor can make is to:
The GREATEST advantage of using web services for the ex…
The GREATEST advantage of using web services for the exchange of information between two systems is:
Which of the following controls is MOST effective in pr…
A clerk changed the interest rate for a loan on a master file. The rate entered is outside the normal range for
such a loan. Which of the following controls is MOST effective in providing reasonable assurance that the
change was authorized?
When using an integrated test facility (ITF), an IS aud…
When using an integrated test facility (ITF), an IS auditor should ensure that:
The IS auditor should:
When reviewing input controls, an IS auditor observes that, in accordance with corporate policy, procedures
allow supervisory override of data validation edits. The IS auditor should:
which of the following will help verify that the instru…
When transmitting a payment instruction, which of the following will help verify that the instruction was not
duplicated?
Which of the following is the MOST critical and contrib…
Which of the following is the MOST critical and contributes the greatest to the quality of data in a data
warehouse?