Which of the following is an evidence-based examination that compares current practices against internal or external criteria?

A) Appraisal
B) Audit
C) Assurance
D) Assessment


B) Audit

Computer Science & Information Technology

You might also like to view...

What is included in an MLA style parenthetical reference (and in which order)?

A) Year published, last name of the author or authors, and the page number in the referenced source B) Last name of the author or authors and the year published of the referenced source C) Last name of the author or authors, the page number in the referenced source, and the publication date D) Last name of the author or authors and the page number in the referenced source

Computer Science & Information Technology

Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.

Indicate whether the statement is true or false.

Computer Science & Information Technology

All of the following tests of controls will provide evidence about the adequacy of the disaster recovery plan except

A. inspection of the second site backup B. analysis of the fire detection system at the primary site C. review of the critical applications list D. composition of the disaster recovery team

Computer Science & Information Technology

The exact substitutions and transformations performed by the algorithm depend on the ________.

A. ciphertext B. decryption algorithm C. secret key D. encryption algorithm

Computer Science & Information Technology