Question 546

An IS auditor is informed that several spreadsheets are being used to generate key financial information. What should the auditor verify NEXT?
  • Question 547

    A CIO has asked an IS to implement several security controls for an organization's IT process and system. The auditor should:
  • Question 548

    An application used at a financial services organization transmits confidential customer data to downstream applications using a batch process. Which of the following controls would protect this information?
  • Question 549

    After observing suspicious activities in a server, a manager requests a forensic analysis. Which of the following findings should be of MOST concern to the investigator?
  • Question 550

    Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?