FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The audit response verification can be obtained at the ____ stage of an IT audit.
A
assessment
B
report
C
follow-up
D
planning
Explanation: 

Detailed explanation-1: -The Follow-up Since most corrective actions cannot be performed at the time of the audit, the audit program manager may require a follow-up audit to verify that corrections were made and corrective actions have been taken.

Detailed explanation-2: -Follow-up Audit is an audit which verifies that corrective actions have been accomplished as scheduled. It determines that the actions are effective in preventing or minimizing future recurrence. Usually, a Follow-up Audit includes a Follow-up Review and a Follow-up Report.

Detailed explanation-3: -The first step in an IT audit is to notify the external and internal partners that an audit is coming. It includes all the stakeholders, management, and support. The whole team should be ready to provide any documentation or details that the auditors request.

Detailed explanation-4: -There are four primary phases of the audit: planning, tests of controls, substantive tests, and audit completion/reporting.

There is 1 question to complete.