Question 391
In a review of an electronic data interchange application using a third-party service provider, the auditor should:
I.Ensure encryption keys meet International Organization for Standardization (ISO) standards.
II.
Determine whether an independent review of the service provider's operation has been conducted.
III.
Verify that only public-switched data networks are used by the service provider.
IV.
Verify that the service provider's contracts include necessary clauses, such as the right to audit.
I.Ensure encryption keys meet International Organization for Standardization (ISO) standards.
II.
Determine whether an independent review of the service provider's operation has been conducted.
III.
Verify that only public-switched data networks are used by the service provider.
IV.
Verify that the service provider's contracts include necessary clauses, such as the right to audit.
Question 392
Which of the following would not be an appropriate step for an internal auditor to perform during an assessment of compliance with an organization's privacy policy?
Question 393
Which of the following is the most important concept to be included in a consulting engagement agreement?
Question 394
A newly promoted chief audit executive (CAE) is faced with a backlog of assurance engagement reports to review for approval. In an attempt to attach a priority for this review, the CAE scans the opinion statement on each report. According to IIA guidance, which of the following opinions would receive the lowest review priority?
1. Graded positive opinion.
2. Negative assurance opinion.
3. Limited assurance opinion.
4. Third-party opinion.
1. Graded positive opinion.
2. Negative assurance opinion.
3. Limited assurance opinion.
4. Third-party opinion.
Question 395
Which of the following trends found on financial reports would most likely indicate a possible problem?