1. Right Answer: B
Explanation: The matching of hash keys over time would allow detection of changes to files. Choice A is incorrect because having a log is not a control, reviewing the log is a control. Choice C is incorrect because the access was already granted-it does not matter how. Choice D is wrong because files can be copied to and from the production environment.
2. Right Answer: A
Explanation: A BPR project more often leads to an increased number of people using technology, and this would be a cause for concern. Incorrect answers:B. As BPR is often technology oriented, and this technology is usually more complex and volatile than in the past, cost savings do not often materialize in this area.D. There is no reason for IP to conflict with a BPR project, unless the project is not run properly.
3. Right Answer: B
Explanation: A modem is a device that translates data from digital to analog and back to digital.
4. Right Answer: C
Explanation: The primary purpose of audit trails is to establish accountability and responsibility for processed transactions.
5. Right Answer: C
Explanation: A primary benefit derived from an organization employing control self-assessment (CSA) techniques is that it can identify high-risk areas that might need a detailed review later.