21. An IS auditor should recommend the use of library control software to provide reasonableassurance that:A. program changes have been authorized.B. only thoroughly tested programs are released.C. modified programs are automatically moved to production.D. source and executable code integrity is maintained.22. By evaluating application development projects against the capability maturity model (CMM), anIS auditor should be able to verify that:23. Which of the following would be an indicator of the effectiveness of a computer security incidentresponse team?24. To ensure an organization is complying with privacy requirements, an IS auditor should FIRSTreview:...4 of 812-05-2019, 11:11
25. An IS auditor is reviewing risk and controls of a bank wire transfer system. To ensure that thebank’s financial risk is properly addressed, the IS auditor will most likely review which of thefollowing?A. Privileged access to the wire transfer systemB. Wire transfer proceduresC. Fraud monitoring controlsD. Employee background checks26. Which of the following is the GREATEST risk to the effectiveness of application system controls?27. Which of the following is the MOST effective control for restricting access to unauthorizedInternet sites in an organization?28. If a database is restored using before-image dumps, where should the process begin following aninterruption?
You've reached the end of your free preview.
Want to read all 8 pages?
- Spring '19
- Computer Security