When performing an audit of a client relationship management (CRM) system migration project, which of the foll
When performing an audit of a client relationship management (CRM) system migration project, which of the following should be of GREATEST concern to an IS auditor?
Which of the following reports should an IS auditor use to check compliance with a service level agreements (S
Which of the following reports should an IS auditor use to check compliance with a service level agreements (SLA) requirement for uptime?
A benefit of quality of service (QoS) is that the:
A benefit of quality of service (QoS) is that the:
An organization has outsourced its help desk. Which of the following indicators would be the best to include i
An organization has outsourced its help desk. Which of the following indicators would be the best to include in the SLA?
The PRIMARY objective of service-level management (SLM) is to:
The PRIMARY objective of service-level management (SLM) is to:
Which of the following should be of PRIMARY concern to an IS auditor reviewing the management of external IT s
Which of the following should be of PRIMARY concern to an IS auditor reviewing the management of external IT service providers?
IT best practices for the availability and continuity of IT services should:
IT best practices for the availability and continuity of IT services should:
During a human resources (HR) audit, an IS auditor is informed that there is a verbal agreement between the IT
During a human resources (HR) audit, an IS auditor is informed that there is a verbal agreement between the IT and HR departments as to the level of IT services expected. In this situation, what should the IS auditor do FIRST?
Which of the following procedures would MOST effectively detect the loading of illegal software packages onto
Which of the following procedures would MOST effectively detect the loading of illegal software packages onto a network?
To determine which users can gain access to the privileged supervisory state, which of the following should an
To determine which users can gain access to the privileged supervisory state, which of the following should an IS auditor review?