Topics
Products
Follow Us:
Hemangdoshi
Answered: Jun 05, 2020
D. The firewall is placed on top of the commercial operating system with all installation options. options.

The greatest concern when implementing firewalls on top of commercial operating...Read More

1 Answer

233 views
Hemangdoshi
Answered: Jun 05, 2020
A. monitors systems performance and tracks problems resulting from program changes.

The responsibilities of a telecommunications analyst include reviewing network load requirements in...Read More

1 Answer

233 views
Hemangdoshi
Answered: Jun 05, 2020
C. redundancy check.

A redundancy check detects transmission errors by appending calculated bits onto the end of each segment of data. A reasonableness check compares data to predefined...Read More

1 Answer

233 views
Hemangdoshi
Answered: Jun 05, 2020
C. ensuring that programs and program changes and documentation adhere to established standards.

The quality assurance group is typically responsible for ensuring that programs, program...Read More

1 Answer

232 views
Hemangdoshi
Answered: Jun 05, 2020
D. a deadman door.

Deadman doors are a system of using a pair of (two) doors. For the second door to operate, the first entry door must close and lock with only one person permitted in the...Read More

1 Answer

232 views
Hemangdoshi
Answered: Jun 05, 2020
C. initially using a hashing algorithm to produce a hash value or message digest from the entire message contents. Upon receiving the data, the recipient can independently create...Read More

1 Answer

232 views
Hemangdoshi
Answered: Jun 05, 2020
A. Reliability and quality of service (QoS)

The company currently has a VPN, hence, issues such as authentication and confidentiality have been implemented by the VPN using tunneling....Read More

1 Answer

232 views
Hemangdoshi
Answered: Jun 05, 2020
A. Yes, because the IS auditor will evaluate the adequacy of the service bureau s plan and assist his/her company in implementing a complementary plan.

The primary responsibility of the IS...Read More

1 Answer

232 views
Hemangdoshi
Answered: Jun 05, 2020
A. advise senior management of the risk involved.

The IS auditors first and foremost responsibility is to advise senior management of the risk involved in having the security administrator...Read More

1 Answer

231 views
Hemangdoshi
Answered: Jun 05, 2020
A. enrollment.

The users of a biometrics device must first be enrolled in the device. The device captures a physical or behavioral image of the human, identifies the unique features and...Read More

1 Answer

231 views
Hemangdoshi
Answered: Jun 05, 2020
B. Expands the programming resources and aids available

A strength of an IDE is that it expands the programming resources and aids available. The other choices are IDE weaknesses.

1 Answer

231 views
Hemangdoshi
Answered: Jun 05, 2020
C. Function point analysis

Function point analysis is an indirect method of measuring the size of an application by considering the number and complexity of its inputs, outputs and files....Read More

1 Answer

231 views
Hemangdoshi
Answered: Jun 05, 2020
D. disable the employee s logical access.

There is a probability that a terminated employee may misuse access rights; therefore, disabling the terminated employees logical access is the...Read More

1 Answer

231 views
Hemangdoshi
Answered: Jun 05, 2020
A. they are set to meet security and performance requirements.

The primary concern is to find the balance between security and performance. Recording changes in an audit trail and...Read More

1 Answer

231 views
Hemangdoshi
Answered: Jun 05, 2020
D. Batch control reconciliations

Explanation: Batch control reconciliations are an example of compensating controls. Other examples of compensating controls are transaction logs,...Read More

1 Answer

231 views

Related Topics Of CISA

Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.