Question 76

Which of the following is MOST likely to be detected by an IS auditor applying data analytic techniques?
  • Question 77

    A company converted its payroll system from an external service to an internal package Payroll processing in April was run in parallel. To validate the completeness of data after the conversion, which of the following comparisons from the old to the new system would be MOST effective?
  • Question 78

    On a public-key cryptosystem when there is no previous knowledge between parties, which of the following will BEST help to prevent one person from using a fictitious key to impersonate someone else?
  • Question 79

    Which of the following should be of MOST concern to an IS auditor during the review of a quality management system?
  • Question 80

    An organization is in the process of deciding whether to allow a bring your own device (BYOD) program. If approved, which of the following should be the FIRST control required before implementation''