Question 56

A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor's MOST appropriate course of action?
  • Question 57

    A data Breach has occurred due to malware. Which of the following should be the FIRST course of action?
  • Question 58

    When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
  • Question 59

    Which of the following method should be recommended by security professional to erase the data on the magnetic media that would be reused by another employee?
  • Question 60

    A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?