ALLInterview.com :: Home Page            
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   ERRORS new
   Refer this Site  Refer This Site to Your Friends  Site Map  Bookmark this Site  Set it as your HomePage  Contact Us     Login  |  Sign Up                      
Google
   
 
Categories >> Certifications >> CISA Certification
 
 


 

 
 Cisco Certifications interview questions  Cisco Certifications Interview Questions (1977)
 Microsoft Certifications interview questions  Microsoft Certifications Interview Questions (167)
 Sun Certifications interview questions  Sun Certifications Interview Questions (41)
 CISA Certification interview questions  CISA Certification Interview Questions (722)
 Oracle Certifications interview questions  Oracle Certifications Interview Questions (57)
 ISTQB Certification interview questions  ISTQB Certification Interview Questions (107)
 Certifications AllOther interview questions  Certifications AllOther Interview Questions (262)
Question
Which of the following is a practice that should be
incorporated into the plan for testing disaster recovery
procedures?

A. Invite client participation.

B. Involve all technical staff.

C. Rotate recovery managers.

D. Install locally stored backup.
 Question Submitted By :: CISA-Certification
I also faced this Question!!     Answer Posted By  
 
Answer
# 1
Answer: C

Recovery managers should be rotated to ensure the experience
of the recovery plan is spread. Clients may be involved but
not necessarily in every case. Not all technical staff
should be involved in each test. Remote or offsite backup
should always be used.
 
Is This Answer Correct ?    7 Yes 0 No
Guest
 
Answer
# 2
Answer: C

Recovery managers should be rotated in order to get the
experience required in all aspects of recovery. Not all
technical staff is needed, nor install locally stored
backup is an action of testing DR.

Referencen CISA Review Manual 2007
 
Is This Answer Correct ?    3 Yes 0 No
Andreas
 
 
 
Answer
# 3
C. Rotate recovery managers.

 
Is This Answer Correct ?    1 Yes 0 No
Antoine
 
Answer
# 4
D Install locally stored backup

Retrieve the backup data and install it in the local drive
so as to verify that the data is correct.

There is no need for client participation, nor require all
tech. staff and recovery managers. SQA can do this work at
regular intervals and can verify the locally stored backup
for its correctness.
 
Is This Answer Correct ?    0 Yes 5 No
Venki
 

 
 
 
Other CISA Certification Interview Questions
 
  Question Asked @ Answers
 
When two or more systems are integrated, input/output controls must be reviewed by the IS auditor in the: A. systems receiving the output of other systems. B. systems sending output to other systems. C. systems sending and receiving data. D. interfaces between the two systems.   1
Which of the following is a check (control) for completeness? A. Check digits B. Parity bits C. One-for-one checking D. Prerecorded input   1
Authentication is the process by which the: A. system verifies that the user is entitled to input the transaction requested. B. system verifies the identity of the user. C. user identifies himself to the system. D. user indicates to the system that the transaction was processed correctly.   1
Which of the following information valuation methods is LEAST likely to be used during a security review? A. Processing cost B. Replacement cost C. Unavailability cost D. Disclosure cost   1
Web and e-mail filtering tools are PRIMARILY valuable to an organization because they: A. Safeguard the organizationís image. B. Maximize employee performance. C. Protect the organization from viruses and nonbusiness materials. D. Assist the organization in preventing legal issues. Tech-Mahindra 2
LANs: A. protect against virus infection. B. protect against improper disclosure of data. C. provide program integrity from unauthorized changes. D. provide central storage for a group of users.   1
In a system development project the purpose of the program and procedure development phase is to: A. prepare, test and document all programs and manual procedures. B. document a business or system problem to a level at which management can select a solution. C. prepare a high-level design of a proposed system solution and present reasons for adopting a solution. D. expand the general design of an approved solution so that program and procedure writing can begin.   1
Which of the following types of controls is designed to provide the ability to verify data and record values through the stages of application processing? A. Range checks B. Run-to-run totals C. Limit checks on calculated amounts D. Exception reports   3
When performing an audit of access rights, an IS auditor should be suspicious of which of the following if allocated to a computer operator? A. READ access to data B. DELETE access to transaction data files C. Logged READ/EXECUTE access to programs D. UPDATE access to job control language/script files   1
Which of the following encrypt/decrypt steps provides the GREATEST assurance in achieving confidentiality, message integrity and nonrepudiation by either sender or recipient? A. The recipient uses his/her private key to decrypt the secret key. B. The encrypted pre-hash code and the message are encrypted using a secret key. C. The encrypted pre-hash code is derived mathematically from the message to be sent. D. The recipient uses the sender's public key, verified with a certificate authority, to decrypt the pre-hash code.   1
The PRIMARY purpose of undertaking a parallel run of a new system is to: A. verify that the system provides required business functionality. B. validate the operation of the new system against its predecessor. C. resolve any errors in the program and file interfaces. D. verify that the system can process the production load.   2
Applying a retention date on a file will ensure that: A. data cannot be read until the date is set. B. data will not be deleted before that date. C. backup copies are not retained after that date. D. datasets having the same name are differentiated.   2
 
For more CISA Certification Interview Questions Click Here 
 
 
 
 
 


   
Copyright Policy  |  Terms of Service  |  Articles  |  Site Map  |  RSS Site Map  |  Contact Us
   
Copyright © 2013  ALLInterview.com.  All Rights Reserved.

ALLInterview.com   ::  KalAajKal.com