Podcast
Questions and Answers
What should the auditor do if the computer operations manager says the company's computer is running at full capacity?
What should the auditor do if the computer operations manager says the company's computer is running at full capacity?
- Use a manual auditing method
- Abort the audit test due to unavailability of computer time
- Request to store the auditor's program in the program library to run when computer time becomes available (correct)
- Use a different computer for the audit
What should the auditor do if refused admission to the computer room?
What should the auditor do if refused admission to the computer room?
- Request to store the auditor's program in the program library
- Seek permission from the top management
- Use alternative audit procedures that do not require computer access (correct)
- Abort the audit test due to lack of access
What should the auditor do if the systems manager says it will take too much time to adapt the auditor's program?
What should the auditor do if the systems manager says it will take too much time to adapt the auditor's program?
- Use a different computer for the audit
- Request the company programmers to write the programs needed for the audit (correct)
- Abort the audit test due to incompatible operating system
- Use a different audit program that is compatible with the operating system
What is one of the ways the IT Department can improve the security of their network infrastructure?
What is one of the ways the IT Department can improve the security of their network infrastructure?
What is one of the roles that an IS auditor can play in Network infrastructure?
What is one of the roles that an IS auditor can play in Network infrastructure?
What is one of the network performance metrics that the IT auditor may use to understand the performance of a network?
What is one of the network performance metrics that the IT auditor may use to understand the performance of a network?
What is the term 'Computer forensics'?
What is the term 'Computer forensics'?
What should the auditor do if the computer scheduling manager suggests storing the auditor's program in the program library?
What should the auditor do if the computer scheduling manager suggests storing the auditor's program in the program library?
Why may the IT Department refuse to allow the auditor to use the company's computer for the audit?
Why may the IT Department refuse to allow the auditor to use the company's computer for the audit?
The ______________ operations manager says the company’s computer is running at full capacity for the foreseeable future.
The ______________ operations manager says the company’s computer is running at full capacity for the foreseeable future.
The computer ______________ manager suggests that your computer program be stored in the computer program library.
The computer ______________ manager suggests that your computer program be stored in the computer program library.
You are refused ______________ to the computer room.
You are refused ______________ to the computer room.
The ______________ manager tells you that it will take too much time to adapt the auditor’s computer audit program.
The ______________ manager tells you that it will take too much time to adapt the auditor’s computer audit program.
The IT Department can use ______________ to improve the security of their network infrastructure.
The IT Department can use ______________ to improve the security of their network infrastructure.
An IS auditor can play a ______________ role in Network infrastructure.
An IS auditor can play a ______________ role in Network infrastructure.
The IT auditor may use ______________ metrics to understand the performance of a network.
The IT auditor may use ______________ metrics to understand the performance of a network.
The term 'Computer forensics' refers to the ______________ of digital evidence.
The term 'Computer forensics' refers to the ______________ of digital evidence.
The IT auditor may use metrics such as ______________ to measure the performance of a network.
The IT auditor may use metrics such as ______________ to measure the performance of a network.