:: Home Page            
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   ERRORS new
   Refer this Site  Refer This Site to Your Friends  Site Map  Bookmark this Site  Set it as your HomePage  Contact Us     Login  |  Sign Up                      
Categories >> Certifications >> CISA Certification


 Cisco Certifications interview questions  Cisco Certifications Interview Questions (1971)
 Microsoft Certifications interview questions  Microsoft Certifications Interview Questions (166)
 Sun Certifications interview questions  Sun Certifications Interview Questions (41)
 CISA Certification interview questions  CISA Certification Interview Questions (722)
 Oracle Certifications interview questions  Oracle Certifications Interview Questions (57)
 ISTQB Certification interview questions  ISTQB Certification Interview Questions (105)
 Certifications AllOther interview questions  Certifications AllOther Interview Questions (260)
Which of the following is a practice that should be
incorporated into the plan for testing disaster recovery

A. Invite client participation.

B. Involve all technical staff.

C. Rotate recovery managers.

D. Install locally stored backup.
 Question Submitted By :: CISA-Certification
I also faced this Question!!     Answer Posted By  
# 1
Answer: C

Recovery managers should be rotated to ensure the experience
of the recovery plan is spread. Clients may be involved but
not necessarily in every case. Not all technical staff
should be involved in each test. Remote or offsite backup
should always be used.
Is This Answer Correct ?    7 Yes 0 No
# 2
Answer: C

Recovery managers should be rotated in order to get the
experience required in all aspects of recovery. Not all
technical staff is needed, nor install locally stored
backup is an action of testing DR.

Referencen CISA Review Manual 2007
Is This Answer Correct ?    3 Yes 0 No
# 3
C. Rotate recovery managers.

Is This Answer Correct ?    1 Yes 0 No
# 4
D Install locally stored backup

Retrieve the backup data and install it in the local drive
so as to verify that the data is correct.

There is no need for client participation, nor require all
tech. staff and recovery managers. SQA can do this work at
regular intervals and can verify the locally stored backup
for its correctness.
Is This Answer Correct ?    0 Yes 5 No

Other CISA Certification Interview Questions
  Question Asked @ Answers
Which of the following techniques or tools would assist an IS auditor when performing a statistical sampling of financial transactions maintained in a financial management information system? A. Spreadsheets B. Parallel simulation C. Generalized audit software D. Regression testing   1
An IS auditor recommends that an initial validation control be programmed into a credit card transaction capture application. The initial validation process would MOST likely: A. check to ensure the type of transaction is valid for that card type. B. verify the format of the number entered then locate it on the database. C. ensure that the transaction entered is within the cardholder's credit limit. D. confirm that the card is not shown as lost or stolen on the master file.   1
During a review of a large data center an IS auditor observed computer operators acting as backup tape librarians and security administrators. Which of these situations would be MOST critical to report? A. Computer operators acting as tape librarians B. Computer operators acting as security administrators C. Computer operators acting as a tape librarian and security administrator D. It is not necessary to report any of these situations.   1
When implementing and application software package, which of the following presents the GREATEST risk? A. Uncontrolled multiple software versions B. Source programs that are not synchronized with object code C. Incorrectly set parameters D. Programming errors   1
IT governance ensures that an organization aligns its IT strategy with: A. Enterprise objectives. B. IT objectives. C. Audit objectives. D. Finance objectives.   2
Which of the following is the MOST effective technique for providing security during data transmission? A. Communication log B. Systems software log C. Encryption D. Standard protocol   1
Which of the following is the basic objective of a control self-assessment program?   4
In a small organization, where segregation of duties is not practical, an employee performs the function of computer operator and application programmer. Which of the following controls should the IS auditor recommend? A. Automated logging of changes to development libraries B. Additional staff to provide segregation of duties C. Procedures that verify that only approved program changes are implemented D. Access controls to prevent the operator from making program modifications   1
The BEST overall quantitative measure of the performance of biometric control devices is: A. false rejection rate. B. false acceptance rate. C. equal error rate. D. estimated error rate.   1
The use of statistical sampling procedures helps minimize: A. sampling risk. B. detection risk. C. inherent risk. D. control risk.   1
Which of the following is an objective of a control self-assessment (CSA) program? A. Audit responsibility enhancement B. Problem identification C. Solution brainstorming D. Substitution for an audit   1
Which of the following processes is the FIRST step in developing a business continuity and disaster recovery plan for an organization? A. Alternate site selection B. Business impact analysis C. Test procedures and frequency D. Information classification   1
For more CISA Certification Interview Questions Click Here 

Copyright Policy  |  Terms of Service  |  Articles  |  Site Map  |  RSS Site Map  |  Contact Us
Copyright 2013  All Rights Reserved.   ::