Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur . Which of the following...
An incorrect version of source code was amended by a development team. This MOST likely indicates a weakness in:
An incorrect version of source code was amended by a development team. This MOST likely indicates a weakness in:A . incident management. B. quality assurance (QA). C. change management. D. project management.View AnswerAnswer: C
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?A . Align service level agreements (SLAs) with current needs. B. Monitor customer satisfaction with the change. C. Minimize costs related to the third-party...
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:A . re-prioritize the original issue as...
Which of the following should be recommended as the PRIMARY factor to determine system criticality?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization . Which of the following should be recommended as the PRIMARY factor to determine system criticality?A . Key performance indicators (KPIs) B. Maximum allowable downtime (MAD) C. Recovery point objective (RPO) D....
Which of the following controls will MOST effectively compensate for the lack of referential integrity?
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance . Which of the following controls will MOST effectively compensate for the lack of referential integrity?A . More frequent data backups B. Periodic table link checks C. Concurrent...
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?A . Analyze whether predetermined test objectives were met. B. Perform testing at the backup data center. C. Evaluate participation by key personnel. D. Test offsite backup files.View AnswerAnswer: C
The PRIMARY advantage of object-oriented technology is enhanced:
The PRIMARY advantage of object-oriented technology is enhanced:A . efficiency due to the re-use of elements of logic. B. management of sequential program execution for data access. C. grouping of objects into methods for data access. D. management of a restricted variety of data types for a data object.View AnswerAnswer:...
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?A . Lack of appropriate labelling B. Lack of recent awareness training. C. Lack of password protection D. Lack of appropriate data classificationView AnswerAnswer: D
What is the MOST important task before implementing any associated email controls?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees . What is the MOST important task before implementing any associated email controls?A . Require all employees to sign nondisclosure agreements (NDAs). B. Develop an acceptable use policy for end-user computing (EUC)....