Which of the following would be the MOST effective audit technique for identifying segregation of duties violations in a new enterprise resource planning (ERP) implementation?
Which of the following would an IS auditor use to determine if unauthorized modifications were made to production programs?
which of the following actions would MOST likely result in the destruction or corruption of evidence on a compromised system?
During an exit interview, in cases where there is disagreement regarding the impact of a finding, an IS auditor should: