A strength of an implemented quality system based on ISO
9001 is that it:
A. guarantees quality solutions to business problems.
B. results in improved software life cycle activities.
C. provides clear answers to questions concerning
cost-effectiveness.
D. does not depend on the maturity of the implemented
quality system.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
A strength of an implemented quality system based on ISO
9001 is that it enhances improvements in software life cycle
activities, quality assurance and quality control.
Weaknesses of the system include that it can fail to provide
clear answers to questions concerning productivity,
reliability or cost-effectiveness of the system. A quality
system is not a guarantee of quality solutions to business
problems since poorly defined user requirements will
adversely affect the design of the software. Depending on
the maturity of the implemented quality system stages can
vary from not implemented to fully implemented procedures.
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / clem
A strngth of an implemented quality system based on ISO
9001 is that it provides consistent process and ensures
feed back.
| Is This Answer Correct ? | 0 Yes | 0 No |
Data edits are an example of: A. preventive controls. B. detective controls. C. corrective controls. D. compensating controls.
Which of the following is the MOST effective control over visitor access to a data center? A. Visitors are escorted. B. Visitor badges are required. C. Visitors sign in. D. Visitors are spot-checked by operators.
Which of the following goals would you expect to find in an organization's strategic plan? A. Test a new accounting package. B. Perform an evaluation of information technology needs. C. Implement a new project planning system within the next 12 months. D. Become the supplier of choice within a given time period for the product offered.
Which of the following functions, if performed by scheduling and operations personnel, would be in conflict with a policy requiring a proper segregation of duties? A. Job submission B. Resource management C. Code correction D. Output distribution
IS management has decided to rewrite a legacy customer relations system using fourth-generation languages (4GLs). Which of the following risks is MOST often associated with system development using 4GLs? A. Inadequate screen/report design facilities B. Complex programming language subsets C. Lack of portability across operating systems D. Inability to perform data intensive operations
An IS auditor should be involved in: A. observing tests of the disaster recovery plan. B. developing the disaster recovery plan. C. maintaining the disaster recovery plan. D. reviewing the disaster recovery requirements of supplier contracts.
Which of the following would be of MOST concern to an IS auditor reviewing a VPN implementation? Computers on the network that are located: A. on the enterprise's facilities. B. at the backup site. C. in employees' homes. D. at the enterprise's remote offices.
Which of the following is the PRIMARY safeguard for securing software and data within an information processing facility? A. Security awareness B. Reading the security policy C. Security committee D. Logical access controls
A goal of processing controls is to ensure that: A. the data are delivered without compromised confidentiality. B. all transactions are authorized. C. accumulated data are accurate and complete through authorized routines. D. only authorized individuals perform sensitive functions.
The PKI element that manages the certificate life cycle, including certificate directory maintenance and certificate revocation list (CRL) maintenance and publication is the: A. certificate authority. B. digital certificate. C. certification practice statement. D. registration authority.
Which of the following group/individuals should assume overall direction and responsibility for costs and timetables of system development projects? A. User management B. Project steering committee C. Senior management D. Systems development management
Which of the following is a form of an Internet attack? A. Searching for software design errors B. Guessing user passwords based on their personal information C. Breaking the deadman's door to gain entry D. Planting a trojan horse