Topics
Products
Follow Us:
Wyatt Williams
Answered: Jun 04, 2020
D. predictable software processes are followed.

By evaluating the organizations development projects against the CMM, the IS auditor determines whether the development organization follows...Read More

1 Answer

266 views
Hemangdoshi
Answered: Jun 04, 2020
A. payroll reports should be compared to input forms.

The best way to confirm data accuracy, when input is provided by the company and output is generated by the bank, is to verify the...Read More

1 Answer

266 views
Hemangdoshi
Answered: Jun 04, 2020
A. Verifying production to customer orders

Verification will ensure that production orders match customer orders. Logging can be used to detect inaccuracies, but does not in itself...Read More

1 Answer

262 views
Chris Kenway, Content Writer
Answered: Sep 10, 2018
A correct anticipation of break-fix is of great concern in application management. With constant pressures for budget reduction it is often thought that application maintenance is an area where a...Read More

2 Answers

260 views
Hemangdoshi
Answered: Jun 04, 2020
B. all the relevant vulnerabilities and threats are identified.

In developing a risk-based audit strategy, it is critical that the risks and vulnerabilities be understood. This will...Read More

1 Answer

260 views
Hemangdoshi
Answered: Jun 04, 2020
A. Defining the areas to be reviewed

On the basis of the evaluation of the entire business process, correctly defining the areas to be reviewed is the first step in a BPR project. On the...Read More

1 Answer

260 views
Hemangdoshi
Answered: Jun 04, 2020
D. Password implementation and administration

The most comprehensive control in this situation is password implementation and administration. While firewall installations are the primary...Read More

1 Answer

260 views
Hemangdoshi
Answered: Jun 04, 2020
B. usage of a structured query language (SQL).

The use of SQL facilitates portability. Verification of import and export procedures with other systems ensures better interfacing with...Read More

1 Answer

260 views
Hemangdoshi
Answered: Jun 04, 2020
B. network security review.

Network security reviews include reviewing router access control lists, port scanning, internal and external connections to the system, etc. Environmental...Read More

1 Answer

259 views
Hemangdoshi
Answered: Jun 04, 2020
B. Identification of network applications to be externally accessed

Explanation: Identification of the applications required across the network should be identified first. After...Read More

1 Answer

258 views
Hemangdoshi
Answered: Jun 04, 2020
C. generalized audit software to search for address field duplications.

Since the name is not the same (due to name variations), one method to detect duplications would be to compare other...Read More

1 Answer

258 views
Hemangdoshi
Answered: Jun 04, 2020
A. only the sender and receiver are able to encrypt/decrypt the data.

SSL generates a session key used to encrypt/decrypt the transmitted data, thus ensuring its confidentiality. Although...Read More

1 Answer

258 views
Hemangdoshi
Answered: Jun 04, 2020
C. Shoulder surfing

If a password is displayed on a monitor, any person nearby could look over the shoulder of the user to obtain the password. Piggybacking refers to unauthorized persons...Read More

1 Answer

258 views
Hemangdoshi
Answered: Jun 04, 2020
C. Web of trust

Web of trust is a key distribution method suitable for communication in a small group. It ensures pretty good privacy (PGP) and distributes the public keys of users within...Read More

1 Answer

255 views
Hemangdoshi
Answered: Jun 04, 2020
D. The recipient uses the sender s public key, verified with a certificate authority, to decrypt the prehash code. decrypt the prehash code.

Most encrypted transactions use a combination...Read More

1 Answer

254 views

Related Topics Of CISA

Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.