A strength of an implemented quality system based on ISO
9001 is that it:
A. guarantees quality solutions to business problems.
B. results in improved software life cycle activities.
C. provides clear answers to questions concerning
cost-effectiveness.
D. does not depend on the maturity of the implemented
quality system.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
A strength of an implemented quality system based on ISO
9001 is that it enhances improvements in software life cycle
activities, quality assurance and quality control.
Weaknesses of the system include that it can fail to provide
clear answers to questions concerning productivity,
reliability or cost-effectiveness of the system. A quality
system is not a guarantee of quality solutions to business
problems since poorly defined user requirements will
adversely affect the design of the software. Depending on
the maturity of the implemented quality system stages can
vary from not implemented to fully implemented procedures.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / clem
A strngth of an implemented quality system based on ISO
9001 is that it provides consistent process and ensures
feed back.
Is This Answer Correct ? | 0 Yes | 0 No |
A long-term IS employee with a strong technical background and broad managerial experience has applied for a vacant position in the IS audit department. Determining whether to hire this individual for this position should be based on the individual's experience and: A. the length of service since this will help ensure technical competence. B. age as training in audit techniques may be impractical. C. IS knowledge since this will bring enhanced credibility to the audit function. D. ability, as an IS auditor, to be independent of existing IS relationships.
Which of the following functions, if performed by scheduling and operations personnel, would be in conflict with a policy requiring a proper segregation of duties? A. Job submission B. Resource management C. Code correction D. Output distribution
Which of the following types of firewalls would BEST protect a network from an Internet attack? A. Screened subnet firewall B. Application filtering gateway C. Packet filtering router D. Circuit-level gateway
A retail company recently installed data warehousing client software at geographically diverse sites. Due to time zone differences between the sites, updates to the warehouse are not synchronized. Which of the following will be affected the MOST? A. Data availability B. Data completeness C. Data redundancy D. Data inaccuracy
A control for a company that wants to prevent virus-infected programs (or other type of unauthorized modified programs) would be to: A. utilize integrity checkers. B. verify program's lengths. C. backup the source and object code. D. implement segregation of duties.
During the review of an organization's disaster recovery and business continuity plan, the IS auditor found that a paper test was performed to verify the existence of all necessary procedures and actions within the recovery plan. This is a: A. preparedness test. B. module test. C. full test. D. walk-through test.
When a new system is to be implemented within a short time frame, it is MOST important to: A. finish writing user manuals. B. perform user acceptance testing. C. add last-minute enhancements to functionalities. D. ensure that code has been documented and reviewed.
An IS auditor reviewing an outsourcing contract of IT facilities would expect it to define the: A. hardware configuration. B. access control software. C. ownership of intellectual property. D. application development methodology.
1. which of the following is used to achieve accountability. a.identification b. authentication c. authorization d. iniation
Which of the following types of controls is designed to provide the ability to verify data and record values through the stages of application processing? A. Range checks B. Run-to-run totals C. Limit checks on calculated amounts D. Exception reports
Which of the following facilitates program maintenance? A. More cohesive and loosely coupled programs B. Less cohesive and loosely coupled programs C. More cohesive and strongly coupled programs D. Less cohesive and strongly coupled programs
Confidential data residing on a PC is BEST protected by: A. a password. B. file encryption. C. removable diskettes. D. a key operated power source.