Q: 8
Which of the following is the BEST course of action for a system administrator who suspects a
colleague may be intentionally weakening a system's validation controls in order to pass through
fraudulent transactions?
Options
Discussion
Its B for sure. ISACA wants you to use official channels, so the whistleblower option is the most appropriate. C is tempting but collecting evidence yourself can cross ethical lines and isn't your role as sysadmin. If anyone disagrees, let me know.
C or D
I feel like C is the way to go here, since you want some proof before escalating. Just reporting without solid evidence might backfire or put you in a tough spot. Not 100% sure though, open if I'm missing some ISACA nuance.
B , ISACA usually expects formal reporting over evidence gathering when fraud is suspected. Monitoring (C) feels logical, but can backfire or even breach policy. If you report via the whistleblower channel, you protect yourself and follow best practice. Anyone disagree?
Maybe C, sometimes collecting evidence first helps clarify if it's a real issue. B feels like a trap here.
C is tempting but it has to be B for ISACA, reporting is the top priority if you suspect fraud.
B tbh, because ISACA loves the whistleblower route for BEST actions. C is tempting but that's more about evidence gathering, not immediate escalation if fraud is suspected. I've seen similar logic in CRISC practice.
Reporting through the whistleblower channel is the standard ISACA play here, so B makes sense. It's about using formal mechanisms instead of taking things into your own hands. Pretty sure that's what they're looking for, but open to other takes.
C/D? Not confident which one fits ISACA logic better on this, honestly.
Its B, not C. Tempting to go with C for evidence but ISACA really emphasizes reporting over investigating solo.
Be respectful. No spam.