An IS auditor observes that each department follows a different approach for creating and securing spreadsheet macros. Which of the following is the auditor's BEST recommendation for management in this situation?
A.
Provide end-user training on spreadsheet macro development.
B.
Prohibit further development of end-user computing (EUC) applications by end users.
C.
Implement an end-user computing (EUC) governance framework.
D.
Secure the folders where macro-enabled spreadsheets are stored.
The best recommendation for the IS auditor in this situation is to implement an end-user computing (EUC) governance framework. An EUC governance framework provides a structured and standardized approach to the development, use, and security of end-user computing applications, including spreadsheet macros. It helps ensure consistency and adherence to security policies across different departments.
Implementing an EUC governance framework is a proactive approach that helps standardize practices, improve security, and enhance overall management of end-user computing applications, including spreadsheet macros.
C. Implement an end-user computing (EUC) governance framework.
In a situation where each department follows a different approach for creating and securing spreadsheet macros, the best recommendation for management is to implement an end-user computing (EUC) governance framework.
Implementing an EUC governance framework involves creating standardized policies and procedures for the development and use of spreadsheet macros across the organization. It ensures that there are consistent guidelines for macro development, security, and management. This approach not only helps in improving security but also enhances efficiency and reduces risks associated with inconsistent practices.
A. Providing end-user training on spreadsheet macro development may help improve individual skills, but it does not address the underlying issue of inconsistent approaches and lack of standardization across departments.
B. Prohibiting further development of end-user computing (EUC) applications by end users might be too restrictive and not practical, especially if these applications are necessary for departmental tasks.
D. Securing the folders where macro-enabled spreadsheets are stored is an important security measure but does not address the root cause of the problem, which is the lack of standardized practices in creating and securing macros.
upvoted 1 times
...
...
This section is not available anymore. Please use the main Exam Page.CISA Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
FAGFUR
5 months, 1 week agoSuperMax
6 months, 3 weeks agoSuperMax
6 months, 3 weeks ago