Which of the following controls should the IS auditor recommend to avoid this situation?
An IS auditor finds out-of-range data in some tables of a database. Which of the following controls
should the IS auditor recommend to avoid this situation?
Responsibility and reporting lines cannot always be established when auditing automated systems since:
Responsibility and reporting lines cannot always be established when auditing automated systems
since:
This principle of data integrity is known as:
In an online transaction processing system, data integrity is maintained by ensuring that a
transaction is either completed in its entirety or not at all. This principle of data integrity is known
as:
Which of the following would help to ensure the portability of an application connected to a database?
Which of the following would help to ensure the portability of an application connected to a
database?
Which of the following should an IS auditor recommend?
Business units are concerned about the performance of a newly implemented system. Which of
the following should an IS auditor recommend?
Which of the following would be an IS auditor’s main concern about the new process?
A company undertakes a business process reengineering (BPR) project in support of a new and
direct marketing approach to its customers. Which of the following would be an IS auditor’s main
concern about the new process?
Which of the following would BEST ensure that the orders are entered accurately and the corresponding products
A company has implemented a new client-server enterprise resource planning (ERP) system.
Local branches transmit customer orders to a central manufacturing facility. Which of the following
would BEST ensure that the orders are entered accurately and the corresponding products are
produced?
When two or more systems are integrated, input/output controls must be reviewed by an IS auditor in the:
When two or more systems are integrated, input/output controls must be reviewed by an IS auditor
in the:
An IS auditor who has discovered unauthorized transactions during a review of EDI transactions is likely to re
An IS auditor who has discovered unauthorized transactions during a review of EDI transactions is
likely to recommend improving the:
The initial validation process would MOST likely:
An IS auditor recommends that an initial validation control be programmed into a credit card
transaction capture application. The initial validation process would MOST likely: