Advertisement
Hemangdoshi
Answered: Apr 19, 2024
B. Prototype systems can provide significant time and cost savings.

Prototype systems can provide significant time and cost savings; however, they also have several disadvantages. They...Read More

1 Answer

355 views
Hemangdoshi
Answered: Apr 19, 2024
A. Visitors are escorted.

Escorting visitors will provide the best assurance that visitors have permission to access the data processing facility. Choices B and C are not reliable...Read More

1 Answer

350 views
Hemangdoshi
Answered: Apr 19, 2024
Redundancy check.

A redundancy check detects transmission errors by appending calculated bits onto the end of each segment of data. A reasonableness check compares data to predefined...Read More

1 Answer

348 views
Hemangdoshi
Answered: Apr 19, 2024
A. Defining the areas to be reviewed

On the basis of the evaluation of the entire business process, correctly defining the areas to be reviewed is the first step in a BPR project. On the...Read More

1 Answer

348 views
Hemangdoshi
Answered: Apr 19, 2024
C. Encapsulation

Encapsulation is a property of objects, and it prevents accessing either properties or methods that have not been previously defined as public. This means that any...Read More

1 Answer

348 views
Hemangdoshi
Answered: Apr 19, 2024
D. Unauthorized system actions are recorded but not investigated.

If unauthorized system actions are not investigated, the log is useless. Not backing up logs periodically is a risk, but...Read More

1 Answer

345 views
Hemangdoshi
Answered: Apr 19, 2024
B. redundancy of data.

Normalization is the removal of redundant data elements from the database structure. Disabling features of normalization in relational databases will increase the...Read More

1 Answer

343 views
Hemangdoshi
Answered: Apr 19, 2024
B. The service level agreement (SLA)

A service level agreement provides the basis for an adequate assessment of the degree to which the provider is meeting the level of agreed service....Read More

1 Answer

343 views
Bobby Rickets, Content Reviewer
Answered: Jan 03, 2019
The auditor should be aware of the point wherein the data flow can be exercised throughout the system. If the auditor would not do this then the purpose will not be hit. It is not proper to do B...Read More

2 Answers

340 views
Hemangdoshi
Answered: Apr 19, 2024
A. advise senior management of the risk involved.

The IS auditors first and foremost responsibility is to advise senior management of the risk involved in having the security administrator...Read More

1 Answer

338 views
Hemangdoshi
Answered: Apr 19, 2024
B. Configuration management

Configuration management accounts for all IT components, including software. Project management is about scheduling, resource management and progress tracking...Read More

1 Answer

334 views
Hemangdoshi
Answered: Apr 19, 2024
D. a transaction is completed or a database is updated.

This concept is included in the atomicity, completeness, isolation and durability (ACID) principle. Durability means that the...Read More

1 Answer

333 views
Hemangdoshi
Answered: Apr 19, 2024
C. atomicity.

The principle of atomicity requires that a transaction be completed in its entirety or not at all. If an error or interruption occurs, all changes made up to that point are...Read More

1 Answer

333 views
Hemangdoshi
Answered: Apr 19, 2024
C. participating applications will have guaranteed service levels.

The main function of QoS is to optimize network performance by assigning priority to business applications and end...Read More

1 Answer

326 views
Hemangdoshi
Answered: Apr 19, 2024
B. Ensuring the integrity of information

Maintaining data integrity is the most important objective of data security. This is a necessity if an organization is to continue as a viable and...Read More

1 Answer

324 views

Related Topics Of CISA

Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.