Which of the following is the BEST way for the auditor to support this project while maintaining independence?
An IS auditor has been invited to join an IT project team responsible for building and deploying a new digital customer marketing platform. Which of the following is the BEST way for the auditor to support this project while maintaining independence?A . Develop selection criteria for potential digital technology vendors.B...
Which of the following would impair the auditor’s independence?
An IS auditor is a member of an application development team that is selecting software. Which of the following would impair the auditor’s independence?A . Verifying the weighting of each selection criteriaB . Approving the vendor selection methodologyC . Reviewing the request for proposal (RFP)D . Witnessing the vendor selection...
When auditing the effectiveness of a biometric system, which of the following indicators would be MOST important to review?
When auditing the effectiveness of a biometric system, which of the following indicators would be MOST important to review?A . False negativesB . False acceptance rateC . Failure to enroll rateD . System response timeView AnswerAnswer: B
Which of the following should be performed FIRST by the auditor?
An IS auditor finds a number of system accounts that do not have documented approvals. Which of the following should be performed FIRST by the auditor?A . Have the accounts removed immediatelyB . Obtain sign-off on the accounts from the application ownerC . Document a finding and report an ineffective...
Which of the following is NOT an example of corrective control?
Which of the following is NOT an example of corrective control?A . OS UpgradeB . Backup and restoreC . Contingency planningD . System MonitoringView AnswerAnswer: D Explanation: The word NOT is used as a keyword in the question. You need to find out a security control from given options which...
What should be done NEXT?
Audit management has just completed the annual audit plan for the upcoming year, which consists entirely of high-risk processes. However, it is determined that there are insufficient resources to execute the plan. What should be done NEXT?A . Remove audits from the annual plan to better match the number of...
Which of the following testing procedure is used by the auditor during accounting audit to check errors in balance sheet and other financial documentation?
Which of the following testing procedure is used by the auditor during accounting audit to check errors in balance sheet and other financial documentation?A . Compliance testingB . Sanity testingC . Recovery testingD . Substantive testingView AnswerAnswer: D Explanation: A procedure used during accounting audits to check for errors in...
Which of the following findings should be of GREATEST concern to the auditor?
An IS auditor is reviewing a bank’s service level agreement (SLA) with a third-party provider that hosts the bank’s secondary data center. Which of the following findings should be of GREATEST concern to the auditor?A . The recovery point objective (RPO) has a shorter duration than documented in the disaster...
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?A . Legal and compliance requirementsB . Customer agreementsC . Organizational policies and proceduresD . Data classificationView AnswerAnswer: A
The risk that the IS auditor will not find an error that has occurred is identified by which of the following terms?
The risk that the IS auditor will not find an error that has occurred is identified by which of the following terms?A . ControlB . PreventionC . InherentD . DetectionView AnswerAnswer: D