Question 26
An internal auditor is assigned to perform data analytics. Which of the following is the next step the auditor should undertake after she has ascertained the value expected from the review?
Question 27
Which of the following are typical audit considerations for a review of authentication?
1) Authentication policies and evaluation of controls transactions.
2) Management of passwords, independent reconciliation, and audit trail.
3) Control self-assessment tools used by management.
4) Independent verification of data integrity and accuracy.
Question 28
Which of the following would best prevent unauthorized external changes to an organization's data?
Question 29
When an organization is choosing a new external auditor, which of the following is the most appropriate role for the chief audit executive to undertake?
Question 30
Which of the following is a major advantage of decentralized organizations, compared to centralized organizations?