An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor's PRIMARY concern Is that:
A month after a company purchased and implemented system and performance monitoring software reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to
A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?
Which of the following should be restricted from a network administrator's privileges in an adequately segregated IT environment?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?