Topics
Products
Follow Us:
Hemangdoshi
Answered: Jul 13, 2020
B. unauthorized access to sensitive data may result.

Unless the data are sanitized, there is a risk of disclosing sensitive data.

1 Answer

235 views
Hemangdoshi
Answered: Jul 13, 2020
C. prevents cost overruns and delivery delays.

Timebox management, by its nature, sets specific time and cost boundaries. It is very suitable for prototyping and RAD, and integrates...Read More

1 Answer

235 views
Hemangdoshi
Answered: Jul 13, 2020
D. identify and evaluate the existing controls.

It is important for an IS auditor to identify and evaluate the existing controls and security once the potential threats and possible impacts...Read More

1 Answer

234 views
Hemangdoshi
Answered: Jul 13, 2020
C. atomicity.

The principle of atomicity requires that a transaction be completed in its entirety or not at all. If an error or interruption occurs, all changes made up to that point are...Read More

1 Answer

234 views
Hemangdoshi
Answered: Jul 13, 2020
D. Top-down

Top-down testing starts with the systems major functions and works downward. The initial emphasis when using prototyping is to create screens and reports, thus shaping most of...Read More

1 Answer

234 views
Hemangdoshi
Answered: Jul 13, 2020
C. Risks must be identified and documented in order to perform proper analysis on them.

Though all factors are relevant, primarily consideration should be documentation of identified risk....Read More

1 Answer

234 views
Hemangdoshi
Answered: Jul 13, 2020
B. SSID (service set identifier) broadcasting has been enabled.

Disabling SSID broadcasting adds security by making it more difficult for unauthorized users to find the network.In any given...Read More

1 Answer

234 views
Hemangdoshi
Answered: Jul 13, 2020
A. Simple Network Management Protocol

The Simple Network Management Protocol provides a means to monitor and control network devices and to manage configurations and performance. The File...Read More

1 Answer

234 views
Hemangdoshi
Answered: Jul 13, 2020
A. Visitors are escorted.

Escorting visitors will provide the best assurance that visitors have permission to access the data processing facility. Choices B and C are not reliable...Read More

1 Answer

234 views
Hemangdoshi
Answered: Jul 13, 2020
C. emphasizes flexibility in the decision-making approach of users.

DSS emphasizes flexibility in the decision-making approach of users. It is aimed at solving lessstructured problems,...Read More

1 Answer

233 views
Hemangdoshi
Answered: Jul 13, 2020
A. gain an understanding of an organization s goals and objectives.

Strategic planning sets corporate or departmental objectives into motion. Strategic planning is time- and...Read More

1 Answer

233 views
Hemangdoshi
Answered: Jul 13, 2020
C. Use the DBA user account to make changes, log the changes and review the change log the following day.

The use of a database administrator (DBA) user account is (should be) normally...Read More

1 Answer

233 views
Hemangdoshi
Answered: Jul 13, 2020
B. Enhancement of audit responsibilities

Following are the major objectives of CSA program: (1)To concentrate on area of high risk (2)To enhance audit responsibilities Choice C & D are...Read More

1 Answer

233 views
Hemangdoshi
Answered: Jul 13, 2020
A. Attribute sampling

In any given scenario, attribute sampling method (either control is present or absent) will be useful when testing for compliance. Variable sampling is generally used...Read More

1 Answer

233 views
Hemangdoshi
Answered: Jul 13, 2020
B. Non-repudiation

Non-repudiation is the assurance that someone cannot deny something. Non-repudiation services provide evidence that a specific action occurred Typically, non-repudiation...Read More

1 Answer

233 views

Related Topics Of CISA

Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.