During an implementation review of a multiuser distributed application, the IS auditor finds minor weaknesses in three areas-the initial setting of parameters is improperly installed, weak passwords are being used and some vital reports are not being checked properly. While preparing the audit report, the IS auditor should: A. record the observations separately with the impact of each of them marked against each respective finding. B. advise the manager of probable risks without recording the observations, as the control weaknesses are minor ones. C. record the observations and the risk arising from the collective weaknesses. D. apprise the departmental heads concerned with each observation and properly document it in the report.
1 6835When reviewing the implementation of a LAN the IS auditor should FIRST review the: A. node list. B. acceptance test report. C. network diagram. D. user's list.
1 4835During a review of the controls over the process of defining IT service levels, an IS auditor would MOST likely interview the: A. systems programmer. B. legal staff. C. business unit manager. D. application programmer.
1 12131When reviewing an organization's logical access security, which of the following would be of the MOST concern to an IS auditor? A. Passwords are not shared. B. Password files are encrypted. C. Redundant logon IDs are deleted. D. The allocation of logon IDs is controlled.
1 10645An IS auditor, performing a review of an application?s controls, discovers a weakness in system software, which could materially impact the application. The IS auditor should: A. Disregard these control weaknesses as a system software review is beyond the scope of this review. B. Conduct a detailed system software review and report the control weaknesses. C. Include in the report a statement that the audit was limited to a review of the application?s controls. D. Review the system software controls as relevant and recommend a detailed system software review.
1 10265When reviewing a service level agreement for an outsourced computer center an IS auditor should FIRST determine that: A. the cost proposed for the services is reasonable. B. security mechanisms are specified in the agreement. C. the services in the agreement are based on an analysis of business needs. D. audit access to the computer center is allowed under the agreement.
1 7554An IS auditor when reviewing a network used for Internet communications, will FIRST examine the: A. validity of passwords change occurrences. B. architecture of the client-server application. C. network architecture and design. D. firewall protection and proxy servers.
1 7987An IS auditor has just completed a review of an organization that has a mainframe and a client-server environment where all production data reside. Which of the following weaknesses would be considered the MOST serious? A. The security officer also serves as the database administrator (DBA.) B. Password controls are not administered over the client/server environment. C. There is no business continuity plan for the mainframe system?s non-critical applications. D. Most LANs do not back up file server fixed disks regularly.
1 8810When conducting a review of business process re-engineering, an IS auditor found that a key preventive control had been removed. In this case, the IS auditor should: A. inform management of the finding and determine if management is willing to accept the potential material risk of not having that preventing control. B. determine if a detective control has replaced the preventive control during the process and if so, not report the removal of the preventive control. C. recommend that this and all control procedures that existed before the process was reengineered be included in the new process. D. develop a continuous audit approach to monitor the effects of the removal of the preventive control.
2 11134During a post-implementation review of an enterprise resource management system, an IS auditor would MOST likely: A. review access control configuration. B. evaluate interface testing. C. review detailed design documentation. D. evaluate system testing.
2 11981An IS auditor who is reviewing application run manuals would expect them to contain: A. details of source documents. B. error codes and their recovery actions. C. program logic flowcharts and file definitions. D. change records for the application source code.
3 8371Review your data from the entire module. Say we ask you to redo the purification.Is there any step that you could eliminate? Which one? Why can you eliminate it?
2 4622
When a non-conformance is noted during these "reviews", what happens next?
About peer reviews ?
PLEASE SEND ME THE DOCUMENTS IF ANY ONE HAVE REGARDING THE IMPACT ANALYSYS,REVIEWS
types of reviews?Advantages of reviews? Diff between process and procedure? diff b/w verification and validation? diff b/w cmm,cmmi? exp tqm,gqm,iso,ieee? Roles and responsibilities of tester? Ricks,types of ricks? what r Quality factors?
I am asked to create Usability testing methodology document, basically listing the Procedures & methodology to/for: a. Entry criteria Exit criteria for usability test b. Deliverables d. Methods of doing Reviews and inspection e. Methods of Reporting f. at which testing phase usability testing is done in v model Is there any sample document/template available on Internet? Any help will be greatly appreciated.
explain with examples what r the roles & Responsiblities of a functional consultant who reviews the Test Scripts, Test Cases and Test Execution Results of AP, FA and GL.
Sir, Iam Applied in rrb for the posts of Junior Engineer.I want to know about the or question previews to study well.Pl send it to shukla_varun1985@yahoo.com.
To my surprise,my visa interview was too short and shocking. I had 1310 in gre and 109 in toefl. I completed BE in Elect and comm with 75% in 2007 and had been working in a multinational software company since then. i applied for masters in elect and comm in Lamar university with 60% fee waiver.. here goes the interview VO:( took my documents) how many universities??(raising his eyebrow) Me:2 VO: Looking at me with questioning eyes? Me: Lamar university, Texas and Cleveland State University, Ohio. VO: Why did u apply for Cleveland University? Me: This is a good university, i got good reviews about this university from online forums and communities and it was offering me right courses in computer networking along with other courses in Electrical Engineering..... VO: Interrupted... it is not a very high ranking university, how can u say its a good university? Me: Ranking of the university was not my sole criteria... VO: Interrupted... ohh!!! (sarcastically) what was your criteria? Me: I focused on the department and the courses that were being offered.. Moreover, I got good feedback.... VO: Go.. Me: ok. can u give me the reason? VO: next one come.. I don't understand what went wrong?
1.explain end to end process of qc,2.how many tabs are in qc9.0,qc10.0 3.what is review, how many reviews are following in aproject 4.how will you get the requirements 5.why do we choose testing 6.how to export tc's and requirements to qc through add-ins
Performance reporting tools and techniques include all of the following except: A. Earned value analysis B. Statistical sampling C. Variance analysis D. Performance reviews
The purpose of a quality audit includes all of the following except: A. Examines the work of the project and formally accepts the work results B. Determines how the project is progressing and makes corrections C. Identifies lessons learned D. Reviews quality management activities to ensure the right quality elements are being examined
All of the following are tools and techniques of the Performance Reporting process except: A. Variance analysis B. Performance reporting C. Information distribution D. Performance reviews
You are a project manager for Dutch Harbor Consulting. Your latest project involved the upgrade of an organization's operating system on 236 servers. You performed this project under contract. You are in the Contract Closeout process and have reviewed the contracting process to identify lessons learned. What is the name of the tool and technique of Contract Closeout you used to perform this function? A. Procurement audits B. Performance reviews C. Performance audits D. Procurement reviews
You are a project manager for Penguin Software. Your company creates custom software programs for hospitals and large dental offices. You have just completed a project and are performing earned value analysis, trend analysis, and performance reviews. Which of the following is true? A. This is performance measurement documentation, which is an input to the Contract Closeout process B. This is performance measurement documentation, which is an input to the Administrative Closure process C. These are performance reporting tools and techniques of the Administrative Closure process D. These are performance reporting tools and techniques of the Contract Closeout process
Could reviews or inspections be considered part of testing?