ANAK FMIPA

Blognya Anak Fmipa

Anak Fmipa

LightBlog

Tuesday, March 13, 2018

the Information Technology Governance and Information Audit voll 3

An IS auditor determines that external consulting was used to create a recovery plan. Which of the following actions would be most appropriate for the IS auditor to take?
Select one:

In using public-key interchange (PKI) encryption, which key is not used by the recipient for decrypting a message?
Select one:

Portfolio management includes all of the following except which one?
Select one:

In a risk-based audit approach, an IS auditor must consider the inherent risk and
Select one:

Which of the following application attributes are not relevant when determining the priority order for recovery?
Select one:

Control objectives are defined in an audit program to
Select one:

What is the primary purpose of using the root kit?
Select one:

The primary reason for reviewing audit work is to
Select one:

Which of the following systems uses heuristic techniques to make decisions on behalf of the user?
Select one:

Segregation or separation of duties may not be practical in a small environment. A single employee may be performing the combined functions of server operator and application programmer. The IS auditor should recommend controls for which of the following?
Select one:

Due care can best be described as
Select one:

What is the purpose of using the ACID principle with database applications?
Select one:

What are three of the four key perspectives on the IT balanced scorecard?
Select one:

Which of the following statements is true concerning a software worm?
Select one:

What is one of the bigger concerns regarding asset disposal?
Select one:

Complete the following statement: A _______ must be used to prevent ________ of the hard-disk evidence during the collection phase of forensic investigations.
Select one:

Using public-key interchange (PKI) encryption, which key is used by the sender for authentication of the receiving party?
Select one:

When auditing the use of encryption, which of the following would be the primary concern of the auditor?
Select one:

During a business continuity audit, it is discovered that the business impact analysis (BIA) was not performed even though an initial feasibility review of the financial statement was performed. What would this indicate to the auditor?
Select one:

Which backup method will copy only changed files without resetting the archive bit (archive flag)?
Select one:

One of the most important reasons for having the audit organization report to the audit committee of the board is because
Select one:

Which of the following statements is true concerning asymmetric key cryptography?
Select one:

Implementing a strong external boundary is a successful method to prevent hackers and thieves from accessing your internal computer systems provided you are using which of the following technologies?
Select one:

Which of the following is the most significant issue to consider regarding insurance coverage?
Select one:

When reviewing the information recovery procedures, an IS auditor would be least concerned with finding procedures that
Select one:

What part of the audited businesses background is least likely to be relevant when assessing risk and planning an IS audit?
Select one:

Which of the following nonstatistical audit samples is also known as a judgmental sample?
Select one:

Which of the following best describes how a CISA should treat guidance from the IS audit standards?
Select one:

An audit charter serves the following primary purpose:
Select one:

Some things to consider when determining what reportable findings should be are
Select one:

Which of the following would be a concern that the auditor should explain in the audit report along with their findings?
Select one:

In order to meet the requirements of audit, evidence sampling must be
Select one:

Which method of backup should be used on a computer hard disk or flash media prior to starting a forensic investigation?
Select one:

Which of the following is the best choice to ensure that internal control objectives are met?
Select one:

No comments:

Post a Comment