When reviewing procedures for emergency changes to programs, the IS auditor should verify that the procedures:
To determine if unauthorized changes have been made to production code the BEST audit procedure is to:
Which of the following controls wou Id BEST mitigate the risk of undetected and unauthorized program changes to the production environment?
Which of the following processes should an IS auditor recommend to assist in the recording of baselines for software releases?
The MOST significant concern an IS auditor should have with this practice is the nonconsideration bylT of: