Answers
Answer updated on: 12 Feb 2020
A. a clear business case has been approved by management. The first concern of the IS auditor should be to establish that the proposal meets the needs of the business, and this should be established by a clear business case. Although compliance with security standards is essential, as are meeting the needs of the users and having users involved in the implementation process, it is too early in ...
Answer updated on: 12 Feb 2020
B. Determine the vulnerabilities/threats to the data centre site. During planning, the IS auditor should get an overview of the functions being audited and evaluate the audit and business risks. Choices A and D are part of the audit fieldwork process that occurs subsequent to this planning and preparation. Choice C is not part of a security review.
Answer updated on: 12 Feb 2020
A. User managementUser management assumes ownership of the project. Project should be defined by user management. Also, they should review and approve deliverables to ensure that project is as per their requirement. Role of Strategy Committee is to advise board on IT initiatives. The project steering committee provides overall direction and is also responsible for monitoring project costs and ...
Answer updated on: 12 Feb 2020
C. the data storage media are sanitized. To ensure confidentiality of the organizations data when disposing of used computers, the information stored on the computers should not be available once the computers are out of control of the organization. Destroying or sanitizing the storage media will provide this assurance. The next best method is to ensure that the computers were not used for ...
Answer updated on: 12 Feb 2020
A. of the point at which controls are exercised as data flow through the system.An IS auditor should focus on when controls are exercised as data flow through a computer system. Choice B is incorrect since corrective controls may also be relevant. Choice C is incorrect since corrective controls remove or reduce the effects of errors or irregularities and are exclusively regarded as compensating ...
Answer updated on: 12 Feb 2020
A. The application owner was unaware of several changes applied to the application by the IT DepartmentChoice A is the most significant finding as it directly affects the integrity of the applications data and is evidence of an inadequate change control process and incorrect access rights to the processing environment. Although backing up the application data only once a week is a finding, it ...
Answer updated on: 12 Feb 2020
B. high-risk areas within the organization.The first and most critical step in the process is to identify high-risk areas within the organization. Business department managers and senior executives are in the best positions to offer insight into these areas. Once potential areas of implementation have been identified, an assessment of potential impact should be completed to identify applications ...
Answer updated on: 12 Feb 2020
D. outline the overall authority, scope and responsibilities of the audit function.An audit charter should state managements objectives for and delegation of authority to IS audit. This charter should not significantly change over time and should be approved at the highest level of management. An audit charter would not be at a detailed level and, therefore, would not include specific audit ...
Answer updated on: 12 Feb 2020
D. a transaction is completed or a database is updated. This concept is included in the atomicity, completeness, isolation and durability (ACID) principle. Durability means that the database survives failures (hardware or software). Isolation means that each transaction is separated from other transactions. Consistency means that integrity conditions are maintained.
Answer updated on: 12 Feb 2020
A. Black box test A black box test is a dynamic analysis tool for testing software modules. During the testing of software modules a black box test works first in a cohesive manner as a single unit/entity consisting of numerous modules, and second with the user data that flows across software modules. In some cases, this even drives the software behavior. In choices B, C and D, the software ...
No any questions is under moderation!
Following
You are following 0 people.
Followers
You have 1 followers.
Rank
1st
RankAlfred Hook
139
Asked134
Answered37635
Total Points
2nd
RankOrion Thames
150
Asked146
Answered35233
Total Points
3rd
RankCambron Bill
148
Asked149
Answered35215
Total Points
4th
RankCatherine Halcombe
108
Asked124
Answered23036
Total Points
5th
RankSantepro
600
Asked714
Answered22559
Total Points
6th
RankGregorynaomi
15
Asked14
Answered13608
Total Points
7th
RankRN Pedia
260
Asked167
Answered10271
Total Points
8th
RankAdewumiKoju
3
Asked1
Answered9548
Total Points
9th
RankJaksiboy
24
Asked27
Answered8384
Total Points
10th
RankCripstwick
13
Asked15
Answered8226
Total Points
Load More