Question 296

Which of the following is MOST critical when creating data for testing the logic in a new or modified application system?
  • Question 297

    An IS auditor discovers that developers have operator access to the command line of a production environment operating system. Which of the following controls would BEST mitigate the risk of undetected and unauthorized program changes to the production environment?
  • Question 298

    In an online transaction processing system, data integrity is maintained by ensuring that a transaction is either completed in its entirety or not at all. This principle of data integrity is known as:
  • Question 299

    An efficient use of public key infrastructure (PKI) should encrypt the:
  • Question 300

    Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's release management processes?