1. An organization is replacing its financial processing system. To help ensure that transactions in the new system are processed accurately, which of the following is MOST appropriate?
A) Compare year-to-date balances between the systems. B) Reconcile results of parallel processing. C) Document and test internal controls over the conversion. D) Review data file conversion procedures.
2. Which of the following methods would be MOST effective in verifying that all changes have been authorized?
A) Reconciling problem tickets with authorized change control entries B) Reconciling reports of changes in production libraries to authorized change log entries C) Validating authorized change log entries with individual(s) who promoted into production D) Reconciling reports of changes in development libraries to supporting documentation
3. During the evaluation of a firm's newly established whistleblower system, an auditor notes several findings. Which of the following should be the auditor'sGREATEST concern?
A) New employees have not been informed of the whistleblower policy. B) The whistleblower's privacy is not protected. C) The whistleblower system does not track the time and date of submission. D) The whistleblower system is only available during business hours.
4. An organization has established three IS processing environments: development, test, and production. The MAJOR reason for separating the development and test environments is to:
A) obtain segregation of duties between IS staff and end users. B) limit the user's access rights to the test environment. C) perform testing in a stable environment. D) protect the programs under development from unauthorized testing.
5. An organization allows its employees to use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
A) Partitioning the work environment from personal space on devices B) Preventing users from adding applications C) Restricting the use of devices for personal purposes during working hours D) Installing security software on the devices
Leave a comment