During a review of a business continuity plan, an IS auditor noticed that the point at which a situation is declared to be a crisis has not been defined. The MAJOR risk associated with this is that: A. assessment of the situation may be delayed. B. execution of the disaster recovery plan could be impacted. C. notification of the teams might not occur. D. potential crisis recognition might be delayed.1 106
An IS auditor has been assigned to conduct a test that compares job run logs to computer job schedules. Which of the following observations would be of the GREATEST concern to the IS auditor? A. There are a growing number of emergency changes. B. There were instances when some jobs were not completed on time. C. There were instances when some jobs were overridden by computer operators. D. Evidence shows that only scheduled jobs were run.1 139
While reviewing an ongoing project, the IS auditor notes that the development team has spent eight hours of activity on the first day against a budget of 24 hours (over three days). The projected time to complete the remainder of the activity is 20 hours. The IS auditor should report that the project: A. is behind schedule. B. is ahead of schedule. C. is on schedule. D. cannot be evaluated until the activity is completed.1 116
An IS auditor should use statistical sampling and not judgmental (nonstatistical) sampling, when: A. the probability of error must be objectively quantified. B. the auditor wants to avoid sampling risk. C. generalized audit software is unavailable. D. the tolerable error rate cannot be determined.1 148
The MAIN reason for requiring that all computer clocks across an organization be synchronized is to: A. prevent omission or duplication of transactions. B. ensure smooth data transition from client machines to servers. C. ensure that email messages have accurate time stamps. D. support the incident investigation process.1 116
During an IS audit of the disaster recovery plan (DRP) of a global enterprise, the auditor observes that some remote offices have very limited local IT resources. Which of the following observations would be the MOST critical for the IS auditor? A. A test has not been made to ensure that local resources could maintain security and service standards when recovering from a disaster or incident. B. The corporate business continuity plan (BCP) does not accurately document the systems that exist at remote offices. C. Corporate security measures have not been incorporated into the test plan. D. A test has not been made to ensure that tape backups from the remote offices are usable.1 253
When reviewing the IT strategic planning process, an IS auditor should ensure that the plan: A. incorporates state of the art technology. B. addresses the required operational controls. C. articulates the IT mission and vision. D. specifies project management practices.1 138
An IS auditor is reviewing a project that is using an agile software development approach. Which of the following should the IS auditor expect to find? A. Use of a capability maturity model (CMM) B. Regular monitoring of task-level progress against schedule C. Extensive use of software development tools to maximize team productivity D. Postiteration reviews that identify lessons learned for future use in the project1 119
To detect attack attempts that the firewall is unable to recognize, an IS auditor should recommend placing a network intrusion detection system (IDS) between the:1 150
During the course of an audit, the IS auditor discovers that the human resources (HR) department uses a cloud-based application to manage employee records. The HR department engaged in a contract outside of the normal vendor management process and manages the application on its own. Which of the following choices is of MOST concern? A. Maximum acceptable downtime metrics have not been defined in the contract. B. The IT department does not manage the relationship with the cloud vendor. C. The help desk call center is in a different country, with different privacy requirements. D. Company-defined security policies are not applied to the cloud application.1 192
Which of the following choices BEST ensures the effectiveness of controls related to interest calculation inside an accounting system? A. Re-performance B. Process walk-through C. Observation D. Documentation review1 184
aadhaar certification questions25
Do you know at least 5 principles of a database system? plz send me with examples
I am interested in doing QTP certification.Can u pls send me the details as to how to proceed with the same?Also can u pls send me the required study materials,question pattern and sample questions?My email id is email@example.com
Which is best insistute to learn IIS 6.0 and 7.0
what are the effects on the QoS in each layer of OSI model in network security?
Can anybody please tell me , how do we integrate HR & FI in SAP. Thanks & Regards, Neha
I want to do QTP Mercury Certification, give me an idea and the where can i register for that?
i have certification in Remedy Tools But anybady tell me in Hydrabad remedt certification is available and which institute and give me the address...
how we update the IOS version with the help of TFTP?
from where can i avail a certificate course of EPBX so that in helps me improve my resume as front desk executive
I have my NCFM certification-beginner's level exam at 9th of june. if anybody has any dump/test paper except those, present is nse-india site please send it to me at firstname.lastname@example.org thanks in advance
hi,I m preparing for istqb this month.I am getting difficulty to understand questions regarding statement coverage and branch coverage .can anybody help me to how to calculate statement coverage and branch coverage. Could anyone provide me questions on statement coverage and branch coverage and there solutions and also how to solve it?please do reply ASAP. Also could you provide me some dumb papers related to exam?
hi! can anyone tel me is it worth doing IBM web sphere certification from reliance global services Hyderabad?
How do we handle decimal data error in rpg ?
On which layer does L2F, PPTP and L2TP operate?
1. your user want to display the records of the passenger traveling in the train.He can Sort the list either by the train no or by the date of journey how will the list will be displayed in the Control Level Processing in the Extract Dataset. a) The user has to create two separate internal table and sort accordingly and Two Control level Processing Blocks. b) The User has to create one internal Table with different header line and one processing Block. c) The User has to Define one internal Table and define Two control Level Processing Blocks. d) The User has to sort the internal Table Accordigly and create one Control lvel Processing Block. 2. Secondary Index will help in a) fetching the Data faster. b) Storing the of Data. 3.What does the Field statement Does. a) Delay the transport b) Go to the PAI block of the screen c) Make the Field inactive. 15. LDB NODES. a) 00 01 02 21 Get node 02 What will happen? 16. Second Question Regarding the same Context but asked about the Get Node 00 Get node 21 What will happen.? 17. Questions : - Logical Database (LDB) : a) Authorization is performed. At the LDB b)we do not have to explicit write any program to fetch the data. c)put data is used to update the Databse.