1.
An IS auditor finds that, at certain times of the day, the data warehouse query performance decreases significantly. Which of the following controls would it be relevant for the IS auditor to review?
2.
Which of the following is widely accepted as one of the critical components in networking management?
3.
An IS auditor reviewing database controls discovered that changes to the database during normal working hours were handled through a standard set of procedures. However, changes made after normal hours required only an abbreviated number of steps. In this situation, which of the following would be considered an adequate set of compensating controls?
4.
Which of the following tests performed by an IS auditor would be the MOST effective in determining compliance with an organization's change control procedures?
5.
An IS auditor reviewing a database application discovers that the current configuration does not match the originally designed structure. Which of the following should be the IS auditors next action?
6.
A programmer maliciously modified a production program to change data and then restored the original code. Which of the following would MOST effectively detect the malicious activity?
7.
The purpose of code signing is to provide assurance that:
8.
An IS auditor should recommend the use of library control software to provide reasonable assurance that:
9.
An organization has recently installed a security patch, which crashed the production server. To minimize the probability of this occurring again, an IS auditor should:
10.
When reviewing procedures for emergency changes to programs, the IS auditor should verify that the procedures: