Which of the following is the PRIMARY reason to involve IS auditors in the software acquisition process?
Correct : A
Start a Discussions
Which of the following BEST indicates to an IS auditor that an organization handles emergency changes appropriately and transparently?
Correct : A
Start a Discussions
An organization produces control reports with a desktop application that accesses data in the central production database. Which of the following would give an IS auditor concern about the reliability of these reports?
Correct : D
Start a Discussions
Which type of threat can utilize a large group of automated social media accounts to steal data, send spam, or launch distributed denial of service (DDoS) attacks?
Correct : A
Start a Discussions
Which of the following would be MOST helpful to an IS auditor performing a risk assessment of an application programming interface (API) that feeds credit scores from a well-known commercial credit agency into an organizational system?
Correct : B
Start a Discussions