Topics-
Products +
     
The auditor should be aware of the point wherein the data flow can be exercised throughout the system. If the auditor would not do this then the purpose will not be hit. It is not proper to do B because there are times when corrective controls are also considered to be important. C is not...Read More

1 Answer

The most critical step while planning an audit is performing a risk assessment. ISACA IS Audit and Assurance Standard 1202 require risk assessment as per the statement 1202.2, where IS audit and assurance professionals must assess and identify the possible risks that are relevant to the area...Read More

1 Answer

The answer to this is letter A. The purpose of this is for the financial performance of the company as a whole. There are so many factors that should be considered such as customer satisfaction, the capacity of the company to innovate and so much more. Letter A is not part of the...Read More

1 Answer

Question was misleading or typo. You probably wanted to right without using an adequate test not inadequate

1 Answer

A correct anticipation of break-fix is of great concern in application management. With constant pressures for budget reduction it is often thought that application maintenance is an area where a company can extract savings. For each application in the portfolio several factors such as maturity...Read More

1 Answer

C

because on ring topology, if we lost just on device we lost all the network

1 Answer

The first thing that the auditor should check is letter C. The auditor should know if the company is adhering to the legal and regulatory requirements available. There are different things that can make the company. It should be checked if the system is meeting the documented purposes of the...Read More

1 Answer

Correct answer is option A
Logging user activities is an example of an operating system access control function. Access controls are features that help control how users and systems communicate. It gives an organization the ability to control, restrict, protect and monitor resour...
Read More

1 Answer

Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.