An IS auditor who has discovered unauthorized transactions during a review of EDI transactions is likely to re
An IS auditor who has discovered unauthorized transactions during a review of EDI transactions is
likely to recommend improving the:
The initial validation process would MOST likely:
An IS auditor recommends that an initial validation control be programmed into a credit card
transaction capture application. The initial validation process would MOST likely:
Which of the following controls should be implemented in the EDI interface to provide for efficient data mappi
A company has recently upgraded its purchase system to incorporate EDI transmissions. Which of
the following controls should be implemented in the EDI interface to provide for efficient data
mapping?
Once an organization has finished the business process reengineering (BPR) of all its critical operations, an
Once an organization has finished the business process reengineering (BPR) of all its critical
operations, an IS auditor would MOST likely focus on a review of:
To BEST ensure payroll data accuracy:
A company uses a bank to process its weekly payroll. Time sheets and payroll adjustment forms (e.g.,
hourly rate changes, terminations) are completed and delivered to the bank, which prepares checks
(cheques) and reports for distribution. To BEST ensure payroll data accuracy:
Which of the following represents the GREATEST potential risk in an EDI environment?
Which of the following represents the GREATEST potential risk in an EDI environment?
Which of the following is the MOST critical and contributes the greatest to the quality of data in a data ware
Which of the following is the MOST critical and contributes the greatest to the quality of data in a
data warehouse?
which of the following will help verify that the instruction was not duplicated?
When transmitting a payment instruction, which of the following will help verify that the instruction
was not duplicated?
The IS auditor should:
When reviewing input controls, an IS auditor observes that, in accordance with corporate policy,
procedures allow supervisory override of data validation edits. The IS auditor should:
When using an integrated test facility (ITF), an IS auditor should ensure that:
When using an integrated test facility (ITF), an IS auditor should ensure that: