1. A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
A) Review a sample of PCRs for proper approval throughout the program change process. B) Trace a sample of program changes from the log to completed PCR forms. C) Use source code comparison software to determine whether any changes have been made to a sample of programs since the last audit date. D) Trace a sample of complete PCR forms to the log of all program changes.
2. An IS auditor submitted audit reports and scheduled a follow-up audit engagement with a client. The client has requested to engage the services of the same auditor to develop enhanced controls. What is the GREATEST concern with this request?
A) It would require the approval of the audit manager. B) It would be beyond the original audit scope. C) It would a possible conflict of interest. D) It would require a change to the audit plan.
3. An IS auditor is evaluating the completeness of privacy procedures involving personally identifiable information (PII). Which of the following is MOST important for the auditor to verify is included in the procedures?
A) Regulatory requirements for protecting PII B) The organization's definition of PII C) Encryption requirements for transmitting PII externally D) A description of how PII is masked within key systems
4. The risk that the IS auditor will not find an error that has occurred is identified by which of the following terms?
A) Control B) Prevention C) Inherent D) Detection
5. An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
A) Improve the change management process B) Perform a configuration review C) Establish security metrics D) Perform a penetration test
Leave a comment