Which is the first software capability maturity model (CMM)
level to include a standard software development process?

A. Initial (level 1)

B. Repeatable (level 2)

C. Defined (level 3)

D. Optimizing (level 5)



Which is the first software capability maturity model (CMM) level to include a standard software de..

Answer / guest

Answer: C

Based on lessons learned from level 1 (initial) and level 2
(repeatable), level 3 (defined) initiates documentation to
provide standardized software processes across the
organization. Level 1 (initial) is characterized as ad hoc,
where reliance is placed on key personnel and processes are
not documented. After level 1, level 2 (repeatable) creates
a learning environment where disciplined processes can be
repeated successfully on other projects of similar size and
scope. The ability to quantitatively control software
projects arises on attaining the final level (5) of CMM. At
the attainment of this level, an organization is in a
position to use continuous process improvement strategies in
applying innovative solutions and state-of-the-art
technologies to its software projects.

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More CISA Certification Interview Questions

Which of the following provides a mechanism for coding and compiling programs interactively? A. Firmware B. Utility programs C. Online programming facilities D. Network management software

1 Answers  


Using test data as part of a comprehensive test of program controls in a continuous online manner is called a/an: A. test data/deck. B. base case system evaluation. C. integrated test facility (ITF). D. parallel simulation.

1 Answers  


Which of the following group/individuals should assume overall direction and responsibility for costs and timetables of system development projects? A. User management B. Project steering committee C. Senior management D. Systems development management

1 Answers  


Which of the following steps would an IS auditor normally perform FIRST in a data center security review? A. Evaluate physical access test results. B. Determine the risks/threats to the data center site. C. Review business continuity procedures. D. Test for evidence of physical access at suspect locations.

1 Answers  


Which of the following user profiles should be of MOST concern to the IS auditor, when performing an audit of an EFT system? A. Three users with the ability to capture and verifiy their own messages B. Five users with the ability to capturr and send their own messages C. Five users with the ability to verificy other users and to send of their own messages D. Three users with the ability to capture and verifiy the messages of other users and to send their own messages

1 Answers  






When an IS auditor obtains a list of current users with access to a WAN/LAN and verifies that those listed are active associates, the IS auditor is performing a: A. compliance test. B. substantive test. C. statistical sample. D. risk assessment.

1 Answers  


The PRIMARY purpose of audit trails is to: A. improve response time for users. B. establish accountability and responsibility for processed transactions. C. improve the operational efficiency of the system. D. provide useful information to auditors who may wish to track transactions.

1 Answers  


Confidential data stored on a laptop is BEST protected by: A. storage on optical disks. B. logon ID and password. C. data encryption. D. physical locks.

1 Answers  


Data edits are an example of: A. preventive controls. B. detective controls. C. corrective controls. D. compensating controls.

1 Answers  


E-mail message authenticity and confidentiality is BEST achieved by signing the message using the:

1 Answers  


During a review of a large data center an IS auditor observed computer operators acting as backup tape librarians and security administrators. Which of these situations would be MOST critical to report? A. Computer operators acting as tape librarians B. Computer operators acting as security administrators C. Computer operators acting as a tape librarian and security administrator D. It is not necessary to report any of these situations.

1 Answers  


A long-term IS employee with a strong technical background and broad managerial experience has applied for a vacant position in the IS audit department. Determining whether to hire this individual for this position should be based on the individual's experience and: A. the length of service since this will help ensure technical competence. B. age as training in audit techniques may be impractical. C. IS knowledge since this will bring enhanced credibility to the audit function. D. ability, as an IS auditor, to be independent of existing IS relationships.

2 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)