ExamGecko
Question list
Search
Search

Related questions











Question 596 - CISA discussion

Report
Export

A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?

A.
Trace a sample of complete PCR forms to the log of all program changes
Answers
A.
Trace a sample of complete PCR forms to the log of all program changes
B.
Use source code comparison software to determine whether any changes have been made to a sample of programs since the last audit date
Answers
B.
Use source code comparison software to determine whether any changes have been made to a sample of programs since the last audit date
C.
Review a sample of PCRs for proper approval throughout the program change process
Answers
C.
Review a sample of PCRs for proper approval throughout the program change process
D.
Trace a sample of program change from the log to completed PCR forms
Answers
D.
Trace a sample of program change from the log to completed PCR forms
Suggested answer: B

Explanation:

The best way to determine whether unauthorized changes have been made to production programs is to use source code comparison software to compare the current version of the programs with the previous version or the approved version. This will identify any changes that have been made without proper authorization or documentation. Tracing PCRs to logs or vice versa will only verify that the authorized changes have been recorded, but not detect any unauthorized changes.Reference:Standards, Guidelines, Tools and Techniques - ISACA, section ''IS Audit and Assurance Tools and Techniques''

asked 18/09/2024
Gaetano Vito Fraccalvieri
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first