Question: 1
An application used at a financial services organization transmits confidential customer data to downstream applications using a batch process. Which of the following controls would protect this information?
Question: 2
Which of the following is the BEST source of information for an IS auditor when planning an audit of a business application's controls?
Question: 3
An IS auditor reviewing a checkpoint/restart procedure should be MOST concerned if it is applied after:
Question: 4
An organization processing high volumes of financial transactions has implemented log file analysis on a central log server to continuously monitor compliance with its fraud policy. Which of the following poses the GREATEST risk to this control?
Question: 5
chain management processes Customer orders are not being fulfilled in a timely manner, and the inventory in the warehouse does not match the quantity of goods in the sales orders. Which of the following is the auditor's BEST recommendation?