Topics
Products
Follow Us:
Hemangdoshi
Answered: May 31, 2020
B. reasonableness check.

A reasonableness check is an edit check, wherein input data are matched to predetermined reasonable limits or occurrence rates. Limit checks verify that data do...Read More

1 Answer

234 views
Hemangdoshi
Answered: May 31, 2020
A. a clear business case has been approved by management.

The first concern of the IS auditor should be to establish that the proposal meets the needs of the business, and this should be...Read More

1 Answer

234 views
Hemangdoshi
Answered: May 31, 2020
B. Ensuring the integrity of information

Maintaining data integrity is the most important objective of data security. This is a necessity if an organization is to continue as a viable and...Read More

1 Answer

234 views
Hemangdoshi
Answered: May 31, 2020
C. vulnerabilities.

Vulnerabilities are a key element in the conduct of a risk analysis. Audit planning consists of short- and long-term processes that may detect threats to the information...Read More

1 Answer

234 views
Hemangdoshi
Answered: May 31, 2020
A can identify high-risk areas that might need a detailed review later.

CSA is predicated on the review of high-risk areas that either need immediate attention or a more thorough review at...Read More

1 Answer

234 views
Hemangdoshi
Answered: May 31, 2020
A. Unit tests

During the programming phase, the development team should have mechanisms in place to ensure that coding is being developed to standard and is working correctly. Unit tests...Read More

1 Answer

234 views
Hemangdoshi
Answered: May 31, 2020
A. that fewer opportunities for review and authorization will exist.

EDI promotes a more efficient paperless environment, but at the same time, less human intervention makes it more...Read More

1 Answer

233 views
Hemangdoshi
Answered: May 31, 2020
C. War driving

€War Driving technique is used by hacker for unauthorised access to wireless infrastructure. War driving is a technique in which wireless equipped computer is used to locate...Read More

1 Answer

233 views
Hemangdoshi
Answered: May 31, 2020
B. Availability

In case of a disruption in service, one of the key functions of network performance monitoring tools is to ensure that the information has remained unaltered. It is a...Read More

1 Answer

233 views
Hemangdoshi
Answered: May 31, 2020
D. latency.

Latency, which is measured using a Ping command, represents the delay that a message/packet will have in traveling from source to destination. A decrease in amplitude as a...Read More

1 Answer

233 views
C. Bernthal, Teacher
Answered: Jan 25, 2019
The first thing that the auditor should check is letter C. The auditor should know if the company is adhering to the legal and regulatory requirements available. There are different things that...Read More

2 Answers

232 views
Hemangdoshi
Answered: May 31, 2020
A. Criticality of information asset.

The appropriate level of protection for an asset is determined based on the criticality of the assets. Other factors are not that relevant as compared...Read More

1 Answer

232 views
Hemangdoshi
Answered: May 31, 2020
C. emphasizes flexibility in the decision-making approach of users.

DSS emphasizes flexibility in the decision-making approach of users. It is aimed at solving lessstructured problems,...Read More

1 Answer

232 views
Hemangdoshi
Answered: May 31, 2020
D. To concentrates on high risk area

In any given scenario, objective of control self assessment is to concentrate on areas of high risk. CSA involves education of line management in...Read More

1 Answer

232 views
Hemangdoshi
Answered: May 31, 2020
B. Determine the vulnerabilities/threats to the data centre site.

During planning, the IS auditor should get an overview of the functions being audited and evaluate the audit and business...Read More

1 Answer

232 views

Related Topics Of CISA

Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.