Topics
Products
Follow Us:
Hemangdoshi
Answered: May 31, 2020
B. senior business management.

Senior management should establish the acceptable risk level, since they have the ultimate or final responsibility for the effective and efficient operation...Read More

1 Answer

237 views
Hemangdoshi
Answered: May 31, 2020
C. Design

To prevent uncontrolled entry of new requirements into a system being developed, a standard process for authorization, approval, testing and documentation is necessary. Such...Read More

1 Answer

237 views
Hemangdoshi
Answered: May 31, 2020
D. ensure that the procedure had been approved.

In the case of a deviation from the predefined procedures, the IS auditor should first ensure that the procedure followed for acquiring the...Read More

1 Answer

237 views
Hemangdoshi
Answered: May 31, 2020
A. establish ownership.

Data classification is necessary to define access rules based on a need-to-do and need-to-know basis. The data owner is responsible for defining the access rules;...Read More

1 Answer

237 views
Hemangdoshi
Answered: May 31, 2020
A. can lack the lower-level detail commands necessary to perform data intensive operations.

All of the answers are advantages of using 4GLs except that they can lack the lower-level...Read More

1 Answer

236 views
Hemangdoshi
Answered: May 31, 2020
B. detection risk

In any given scenario, statistical sampling minimizes the detection risk. Detection risk is the chance that an auditor will not find material misstatements in an entitys...Read More

1 Answer

236 views
Hemangdoshi
Answered: May 31, 2020
B. A compliance test of program library controls

A compliance test determines if controls are operating as designed and are being applied in a manner that complies with management policies...Read More

1 Answer

236 views
Hemangdoshi
Answered: May 31, 2020
D. a Trojan horse.

A Trojan horse is malicious code hidden in an authorized computer program. The hidden code will be executed whenever the authorized program is executed. In this case, as...Read More

1 Answer

236 views
Hemangdoshi
Answered: May 31, 2020
B. Screened-subnet firewall

A screened-subnet firewall, also used as a demilitarized zone (DMZ), utilizes two packet filtering routers and a bastion host. This provides the most secure...Read More

1 Answer

236 views
Hemangdoshi
Answered: May 31, 2020
A. Assimilation of the framework and intent of a written security policy by all appropriate parties

Assimilation of the framework and intent of a written security policy by the users of...Read More

1 Answer

236 views
Hemangdoshi
Answered: May 31, 2020
A. Control total

A control total is frequently used as an easily recalculated control. The number of invoices in a batch or the value of invoices in a batch are examples of control...Read More

2 Answers

235 views
Hemangdoshi
Answered: May 31, 2020
A. encryption.

Encryption of data is the most secure method. The other methods are less secure, with leased lines being possibly the least secure method.

1 Answer

235 views
Hemangdoshi
Answered: May 31, 2020
D. products are compatible with the current or planned OS.

Choices A, B and C are incorrect because none of them is related to the area being audited. In reviewing the proposed application...Read More

1 Answer

235 views
Hemangdoshi
Answered: May 31, 2020
D. Date and time-stamp reviews of source and object code

Date and time-stamp reviews of source and object code would ensure that source code, which has been compiled, matches the...Read More

1 Answer

235 views
Hemangdoshi
Answered: May 31, 2020
C. resource owners.

Resource owners are accountable for protection of their resources. Management should ensure that all information assets (data and systems) have an appointed owner who...Read More

1 Answer

235 views

Related Topics Of CISA

Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.