Question 546
An IS auditor is informed that several spreadsheets are being used to generate key financial information. What should the auditor verify NEXT?
Question 547
A CIO has asked an IS to implement several security controls for an organization's IT process and system. The auditor should:
Question 548
An application used at a financial services organization transmits confidential customer data to downstream applications using a batch process. Which of the following controls would protect this information?
Question 549
After observing suspicious activities in a server, a manager requests a forensic analysis. Which of the following findings should be of MOST concern to the investigator?
Question 550
Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?