Which of the following steps should an internal auditor complete when conducting a review of an electronic data interchange application provided by a third-party service?
Ensure encryption keys meet ISO standards.
Determine whether an independent review of the service provider's operation has been conducted.
Verify that the service provider's contracts include necessary clauses.
Verify that only public-switched data networks are used by the service provider.
Answer : C
The internal audit activity needs to review the information security function but does not have the IT expertise needed for the engagement. Which of the following actions should the chief audit executive take to ensure the internal audit activity conforms with the Standards?
Answer : C
Which of the following actions should the chief audit executive take when senior management decides to accept risks by choosing to do business with a questionable vendor?
Answer : D
Which of the following statements is true regarding engagement planning?
Answer : C
Which of the following statements is true regarding risk assessments, including the evaluation and prioritization of risk and control factors?
Answer : A
Which of the following would be the most reliable source of documentary evidence?
Answer : A
If there is a significant error or omission in the final audit report that was communicated to management, which of the following is the key action for the internal audit activity?
Answer : D