Which of the following is the MOST important task of an IS auditor during an application post-implementation review?
Answer : D
Which of the following would MOST likely jeopardize the independence of a quality assurance (QA} team and could lead to conflict of interest?
Answer : D
Which of the following BEST enables an IS auditor to assess whether jobs were completed according to the job schedule?
Answer : C
Which of the following should be the PRIMARY concern for the it department head when implementing operational log management?
Answer : B
Which of the following is the MOST efficient way to identify fraudulent activity on a set of transactions?
Answer : D
Benford's law analysis is a powerful technique for identifying irregularities or anomalies in numerical datasets, such as financial transactions. It detects deviations from expected frequency distributions, which may indicate fraud.
Control Self-Assessments (CSAs) (Option A): Useful for control evaluation but not for fraud detection.
Interviews with Control Owners (Option B): Provide insights but are not efficient for identifying fraudulent patterns.
Regression Analysis (Option C): Effective for predictive modeling but less so for detecting fraud in transactional data.
Which of the following should be of GREATEST concern to an IS auditor reviewing project documentation for a client relationship management (CRM) system migration project?
Answer : C
Which of the following is the GREATEST advantage of utilizing guest operating systems m a virtual environment?
Answer : C