Question: 1
When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?
Question: 2
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
Question: 3
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
Question: 4
An IS auditor is informed that several spreadsheets are being used to generate key financial information. What should the auditor verify NEXT?
Question: 5
During an audit of identity and access management, an IS auditory finds that the engagement audit plan does not include the testing of controls that regulate access by third parties. Which of the following would be the auditor's BEST course of action?