During a review of a business continuity plan, an IS auditor noticed that the point at which a situation is declared to be a crisis has not been defined. The MAJOR risk associated with this is that: A. assessment of the situation may be delayed. B. execution of the disaster recovery plan could be impacted. C. notification of the teams might not occur. D. potential crisis recognition might be delayed.1 2166
An IS auditor has been assigned to conduct a test that compares job run logs to computer job schedules. Which of the following observations would be of the GREATEST concern to the IS auditor? A. There are a growing number of emergency changes. B. There were instances when some jobs were not completed on time. C. There were instances when some jobs were overridden by computer operators. D. Evidence shows that only scheduled jobs were run.1 1821
While reviewing an ongoing project, the IS auditor notes that the development team has spent eight hours of activity on the first day against a budget of 24 hours (over three days). The projected time to complete the remainder of the activity is 20 hours. The IS auditor should report that the project: A. is behind schedule. B. is ahead of schedule. C. is on schedule. D. cannot be evaluated until the activity is completed.1 1377
An IS auditor should use statistical sampling and not judgmental (nonstatistical) sampling, when: A. the probability of error must be objectively quantified. B. the auditor wants to avoid sampling risk. C. generalized audit software is unavailable. D. the tolerable error rate cannot be determined.1 2957
The MAIN reason for requiring that all computer clocks across an organization be synchronized is to: A. prevent omission or duplication of transactions. B. ensure smooth data transition from client machines to servers. C. ensure that email messages have accurate time stamps. D. support the incident investigation process.1 861
During an IS audit of the disaster recovery plan (DRP) of a global enterprise, the auditor observes that some remote offices have very limited local IT resources. Which of the following observations would be the MOST critical for the IS auditor? A. A test has not been made to ensure that local resources could maintain security and service standards when recovering from a disaster or incident. B. The corporate business continuity plan (BCP) does not accurately document the systems that exist at remote offices. C. Corporate security measures have not been incorporated into the test plan. D. A test has not been made to ensure that tape backups from the remote offices are usable.1 2185
When reviewing the IT strategic planning process, an IS auditor should ensure that the plan: A. incorporates state of the art technology. B. addresses the required operational controls. C. articulates the IT mission and vision. D. specifies project management practices.1 1087
An IS auditor is reviewing a project that is using an agile software development approach. Which of the following should the IS auditor expect to find? A. Use of a capability maturity model (CMM) B. Regular monitoring of task-level progress against schedule C. Extensive use of software development tools to maximize team productivity D. Postiteration reviews that identify lessons learned for future use in the project1 1065
To detect attack attempts that the firewall is unable to recognize, an IS auditor should recommend placing a network intrusion detection system (IDS) between the:2 1130
During the course of an audit, the IS auditor discovers that the human resources (HR) department uses a cloud-based application to manage employee records. The HR department engaged in a contract outside of the normal vendor management process and manages the application on its own. Which of the following choices is of MOST concern? A. Maximum acceptable downtime metrics have not been defined in the contract. B. The IT department does not manage the relationship with the cloud vendor. C. The help desk call center is in a different country, with different privacy requirements. D. Company-defined security policies are not applied to the cloud application.1 1912
Which of the following choices BEST ensures the effectiveness of controls related to interest calculation inside an accounting system? A. Re-performance B. Process walk-through C. Observation D. Documentation review1 2182
aadhaar certification questions353
i was rejected in 2011 for UK visa from gujarat ,india ..i lost that rejection letter..can any one who help me to tell me how to apply for rejected letter in UK embassy. Anybody please give me any idea or email id for it.. I hav tried a lot on www.gov.uk web site...please help me498
Look at the figure. The first number of each host is the IP address, the second number is the subnet mask, and the last number is the default gateway. What is the problem with the TCP/IP network?
Hi Friends, i am planning to give ISTQB Foundation level exam this month (20th September 2010),can anyone please send me the Dumps to my id?? email@example.com "Thanks in Adavance"
Hi, Can any one please tell me the experience of their CCNA interview,and please tell me all the questions they asked in the interview. Many Thanks...
ihave lost my documents before the sbi interview
Where can I get LAtest qtp 2010 exam questions ?
which certification is good oracle/sap?? Is that necessary to learn oracle basics before doing sap?
I am interested in doing QTP certification.Can u pls send me the details as to how to proceed with the same?Also can u pls send me the required study materials,question pattern and sample questions?My email id is firstname.lastname@example.org
dosto bank ki interview me challan jaroori hota h ka sbi ka interview h plz btao me
Hi Friends, plz tell me wht is the fee for IBM Cog-612 exam i.e for Report Authors
i was rejected in 2011 for UK visa from gujarat ,india ..i lost that rejection letter..can any one who help me to tell me how to apply for rejected letter in UK embassy. Anybody please give me any idea or email id for it.. I hav tried a lot on www.gov.uk web site...please help me
For WebSphere MQ clients on some platforms, if a security exit is not defined, the values of two environment variables MQ_USER_ID and MQ_PASSWORD are transmitted to the server. On which of the following platforms are these environment variables used?
I have b licence . I want c licenc. What can i do it. I have 5 years HT experience .
What do you mean by Port Mirroring?
hi, I have apply twice for visitor visa and I was asked if I have a child and I said no I never knew, but I have seven y (7)year old child . and I plan to reapply for the third time show I tell them that I have a 7 year old child? my child mother and I was loving and later she and her family travel another county were there no communication between , in 2014 they came back and she bought my beautiful duather .
1>What do you mean by Networks and Networking? 2>Difference between Vlan And Sub Interface Vlan? 3>What is Fiber Optic Media Converter? 4>What is Firewall? 5>Difference Between Layer2 and Layer3 Switch? 6>What is the function of Multilayer Switch? 7>Expalin STP? What is the Difference between STP and MST? 8>What is the Function of VTP?Explain the modes of VTP? 9>What kind of Message VTp will Send? 10>What is the Difference between Normal and Manageable Switch? 11>Difference between Local Vlan and End to End Vlan? 12>Difference between Distance Vector and Link State Routing protocol? 13>What do you mean by Backbone Fast Port? 14>what is Root Guard and BPDU Guard?