An IS auditor finds a user account where privileged access is not appropriate for the user’s role. Which of the following would provide the BEST evidence to determine whether the risk of this access has been exploited?
A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:
Which of the following is MOST important to the effectiveness of smoke detectors installed in a data processing facility?
The waterfall life cycle model of software development is BEST suited for which of the following situations?