Question: 1
A bank recently experienced fraud where unauthorized payments were inserted into the payments transaction process. An IS auditor has reviewed the application systems and databases along the processing chain but has not identified the entry point of the fraudulent transactions. Where should the auditor look NEXT?
Question: 2
Which of the following control testing approaches is BEST used to evaluate a control's ongoing effectiveness by comparing processing results to independently calculated data?
Question: 3
When planning an end-user computing (EUC) audit, it is MOST important for the IS auditor to:
Question: 4
The PRIMARY purpose for an IS auditor to review previous audit reports during the planning phase of a current audit is to:
Question: 5
A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration in establishing a contingency plan and an alternate processing site?