Topics
Products
Follow Us:
Hemangdoshi
Answered: May 26, 2020
D. protocol analyzer.

Protocol analyzers are network diagnostic tools that monitor and record network information from packets traveling in the link to which the analyzer is attached....Read More

1 Answer

240 views
Hemangdoshi
Answered: May 26, 2020
D. foreign keys.

A foreign key is a column in a table that references a primary key of another table, thus providing the referential integrity. Composite keys consist of two or more...Read More

1 Answer

240 views
Hemangdoshi
Answered: May 26, 2020
D. outline the overall authority, scope and responsibilities of the audit function.

An audit charter should state managements objectives for and delegation of authority to IS audit. This...Read More

1 Answer

240 views
Hemangdoshi
Answered: May 26, 2020
B. data will not be deleted before that date.

A retention date will ensure that a file cannot be overwritten before that date has passed. The retention date will not affect the ability to...Read More

1 Answer

240 views
Hemangdoshi
Answered: May 26, 2020
B. Generalized audit software

Generalized audit software features include mathematical computations, stratification, statistical analysis, sequence checking, duplicate checking and...Read More

1 Answer

239 views
Hemangdoshi
Answered: May 26, 2020
B. Very low RTO, close to zero

The RTO is a measure of the users tolerance to downtime. In case of critical systems, generally RTO is zero or near to zero. Low RTO indicates that system...Read More

2 Answers

238 views
Hemangdoshi
Answered: May 26, 2020
A. result in a correct capture of requirements.

The principal concern should be to ensure an alignment of the application with business needs and user requirements. While the CASE being...Read More

1 Answer

238 views
Hemangdoshi
Answered: May 26, 2020
B. IS assessment methods

Explanation: Assessment methods provide a mechanism, whereby IS management can determine if the activities of the organization have deviated from planned or...Read More

1 Answer

238 views
Hemangdoshi
Answered: May 26, 2020
B. Detailed and correctly applied specifications

When dealing with offshore operations, it is essential that detailed specifications be created. Language differences and a lack of...Read More

1 Answer

238 views
Hemangdoshi
Answered: May 26, 2020
A. Quality of the metadata

Quality of the metadata is the most important element in the design of a data warehouse. A data warehouse is a copy of transaction data specifically structured...Read More

1 Answer

238 views
L. Sevigny, Doctor
Answered: Sep 26, 2018
If an organization already has its IT security baseline defined you need to see if it is sufficient for the level of data present. You need to check its sufficiency. The auditor should evaluate...Read More

2 Answers

237 views
Hemangdoshi
Answered: May 26, 2020
C. Facilitator

The traditional role of an IS auditor in a control self-assessment (CSA) should be that of a facilitator. During a CSA workshop, auditor should guide the clients in...Read More

1 Answer

237 views
Hemangdoshi
Answered: May 26, 2020
B. senior business management.

Senior management should establish the acceptable risk level, since they have the ultimate or final responsibility for the effective and efficient operation...Read More

1 Answer

237 views
Hemangdoshi
Answered: May 26, 2020
D. Alteration

A digital signature includes an encrypted hash total of the size of the message as it was transmitted by its originator. This hash would no longer be accurate if the message...Read More

1 Answer

237 views
Hemangdoshi
Answered: May 26, 2020
C. Design

To prevent uncontrolled entry of new requirements into a system being developed, a standard process for authorization, approval, testing and documentation is necessary. Such...Read More

1 Answer

237 views

Related Topics Of CISA

Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.