Question 21

Which key is used by the sender of a message to create a digital signature for the message being sent?
  • Question 22

    Which of the following is a technique that could be used to capture network user passwords?
  • Question 23

    An IS auditor reviewing an accounts payable system discovers that audit logs are not being reviewed.
    When this issue is raised with management the response is that additional controls are not necessary
    because effective system access controls are in place. The BEST response the auditor can make is to:
  • Question 24

    Which of the following is a benefit of a risk-based approach to audit planning? Audit:
  • Question 25

    A start-up company acquiring for its order-taking system is unable to predict the volume of transactions. Which of the following is MOST important for the company to consider?