Question 96
Which of the following are typical audit considerations for a review of authentication?
1) Authentication policies and evaluation of controls transactions.
2) Management of passwords, independent reconciliation, and audit trail.
3) Control self-assessment tools used by management.
4) Independent verification of data integrity and accuracy.
1) Authentication policies and evaluation of controls transactions.
2) Management of passwords, independent reconciliation, and audit trail.
3) Control self-assessment tools used by management.
4) Independent verification of data integrity and accuracy.
Question 97
Which of the following factors is most likely to lead to a lack of cohesiveness in a project team?
Question 98
According to IIA guidance, which of the following is a primary component of a network security strategy?
Question 99
The economic order quantity for inventory is higher for an organization that has:
Question 100
Which of the following would best prevent unauthorized external changes to an organization's data?