Question: 1
An IS auditor is evaluating a corporate network for a possible penetration by employees. Which of the following findings should give the IS auditor the GREATEST concern?
Question: 2
Which of the following is the PRIMARY advantage of using computer forensic software for investigations?
Question: 3
An IS auditor has imported data from the client's database. The next step-confirming whether the imported data are complete-is performed by:
Question: 4
The vice president of human resources has requested an audit to identify payroll overpayments for the previous year. Which would be the BEST audit technique to use in this situation?
A) Test data
Question: 5
During a security audit of IT processes, an IS auditor found that there were no documented security procedures. The IS auditor should: