Advertisement
Hemangdoshi
Answered: Nov 23, 2024
A. result in a correct capture of requirements.

The principal concern should be to ensure an alignment of the application with business needs and user requirements. While the CASE being...Read More

1 Answer

962 views
Christian Jackson, Content Developer
Answered: Aug 28, 2018
The OSI model is included in the computer software systems within the computers. The main function with the OSI model involves communication. This model contains many layers that perform certain...Read More

3 Answers

828 views
Hemangdoshi
Answered: Nov 23, 2024
C. require that changes after that point be evaluated for cost-effectiveness.

Projects often have a tendency to expand, especially during the requirements definition phase. This expansion...Read More

1 Answer

741 views
Hemangdoshi
Answered: Nov 23, 2024
Describe the authority and responsibilities of the audit department.

The audit charter typically sets out the role and responsibility of the internal audit department. It should...Read More

1 Answer

680 views
Hemangdoshi
Answered: Nov 23, 2024
C. Process charts

To ensure adequate control over the business process, the auditor should first review the flow charts showing the before and after processes. The process charts aid in...Read More

1 Answer

657 views
E. Austin
Answered: Jan 03, 2019
The most critical step while planning an audit is performing a risk assessment. ISACA IS Audit and Assurance Standard 1202 require risk assessment as per the statement 1202.2, where IS audit and...Read More

2 Answers

656 views
Hemangdoshi
Answered: Nov 23, 2024
A. authentication of the web site that will be surfed.

Authenticating the site to be surfed is the primary goal of a web certificate. Authentication of a user is achieved through passwords...Read More

1 Answer

609 views
Hemangdoshi
Answered: Nov 23, 2024
Vulnerability.

The lack of adequate security controls represents a vulnerability, exposing sensitive information and data to the risk of malicious damage, attack or unauthorized...Read More

1 Answer

591 views
Hemangdoshi
Answered: Nov 23, 2024
Compares processing output with independently calculated data.

An integrated test facility is considered a useful audit tool because it uses the same programs to compare processing...Read More

1 Answer

582 views
Hemangdoshi
Answered: Nov 23, 2024
A. can lack the lower-level detail commands necessary to perform data intensive operations.

All of the answers are advantages of using 4GLs except that they can lack the lower-level...Read More

1 Answer

580 views
Hemangdoshi
Answered: Nov 23, 2024
D. Alteration

A digital signature includes an encrypted hash total of the size of the message as it was transmitted by its originator. This hash would no longer be accurate if the message...Read More

1 Answer

557 views
Hemangdoshi
Answered: Nov 23, 2024
A. has a single authentication point.

The primary risk associated with single sign-on is the single authentication point. If a password is compromised, access to many applications can be...Read More

1 Answer

549 views
Hemangdoshi
Answered: Nov 23, 2024
A. Virtual private network

A virtual private network (VPN) allows external partners to securely participate in the extranet using public networks as a transport or shared private...Read More

1 Answer

532 views
Hemangdoshi
Answered: Nov 23, 2024
Very low RTO, close to zero

The RTO is a measure of the users tolerance to downtime. In case of critical systems, generally RTO is zero or near to zero. Low RTO indicates that system...Read More

2 Answers

527 views
Hemangdoshi
Answered: Nov 23, 2024
A. Implement data backup and recovery procedures.

Implementing data backup and recovery procedure is a corrective control, because backup and recovery procedures can be used to roll back...Read More

1 Answer

523 views

Related Topics Of CISA

Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.