Multiple Choice
Which of the following is an information systems audit review procedure?
A) Verify the extent and effectiveness of encryption.
B) Inspect computer sites.
C) Test assignment procedures for user IDs.
D) Observe the preparation of backup files.
Correct Answer:

Verified
Correct Answer:
Verified
Q55: _ can determine whether the necessary control
Q56: Auditing involves the<br>A)collection,review,and documentation of audit evidence.<br>B)planning
Q57: An audit software program that generates programs
Q58: An auditor finds that employee absentee rates
Q59: What type of data does CAATS use
Q61: The first step in a risk-based audit
Q62: An auditor sets an embedded audit module
Q63: Describe the difference between concurrent audit techniques
Q64: Who generally receives the findings and conclusions
Q65: Which of the following is not one