Effective Ways to Identify Unauthorized Changes to Critical Business Applications | IS Auditor Exam Question Answer

Identifying Unauthorized Changes to Critical Business Applications

Prev Question Next Question

Question

Which of the following is the MOST effective way for an IS auditor to identify unauthorized changes to the production state of a critical business application?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

Out of the given options, the most effective way for an IS auditor to identify unauthorized changes to the production state of a critical business application is option B - Compare a list of production system changes with the configuration management database (CMDB).

Explanation:

A. Run an automated scan of the production environment to detect missing software patches: Running an automated scan can detect missing software patches, but it may not identify unauthorized changes to the production state of a critical business application. This option can be useful in identifying vulnerabilities but may not detect unauthorized changes.

B. Compare a list of production system changes with the configuration management database (CMDB): This option is the most effective way for an IS auditor to identify unauthorized changes to the production state of a critical business application. By comparing a list of production system changes with the configuration management database, an IS auditor can determine if any unauthorized changes were made. A configuration management database (CMDB) is a central repository that stores information about the hardware and software components of an IT infrastructure. By comparing the list of production system changes with the CMDB, an auditor can determine if any unauthorized changes have been made to the production environment.

C. Review recently approved changes to application programming interfaces (API) in the production environment: This option may not be effective in identifying unauthorized changes to the production state of a critical business application as the changes may have been made without approval. Additionally, this option only looks at changes to the application programming interfaces and may not detect changes to other areas of the production environment.

D. Review recent updates in the configuration management database (CMDB) for compliance with IT policies: This option is focused on compliance with IT policies, and while it may identify unauthorized changes to the production environment, it may not be as effective as option B in identifying all unauthorized changes.

In summary, while all the options may provide some level of assistance in identifying unauthorized changes to the production state of a critical business application, option B - comparing a list of production system changes with the configuration management database (CMDB) is the most effective way for an IS auditor to identify unauthorized changes.