A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?
An IS auditor is asked to review an organization's technology relationships, interfaces, and dat a. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
Which of the following is MOST important during software license audits?
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?