Which of the following is the biggest concern for open USB ports on end-user computers?
Which of the following is the biggest concern for open USB ports on end-user computers?A . Data corruptionB . Connecting personal devicesC . Install the unauthorized softwareD . Data leakageView AnswerAnswer: D
For information systems auditors, which of the following is critical to assessing fire prevention measures in a manpowered data center located on the upper floors of a multi-story building?
For information systems auditors, which of the following is critical to assessing fire prevention measures in a manpowered data center located on the upper floors of a multi-story building?A . Documentary records of regular inspections by local fire departmentsB . Documentary records of tested emergency evacuation plansC . If...
Which of the following should be the most important factor driving a single application availability requirement when developing a disaster recovery plan?
Which of the following should be the most important factor driving a single application availability requirement when developing a disaster recovery plan?A . Confidentiality of data processed by the applicationB . The criticality of the business processes supported by the applicationC . Total cost of ownership (TCO) of the...
Which of the following is the best way to identify fraudulent activity in a transaction processing system?
Which of the following is the best way to identify fraudulent activity in a transaction processing system?A . Check the authorized traffic and time saved by the systemB . Check the source code of the applicationC . Statistical analysis and classification of all transactionsD . Review whether the transaction...
What are the main reasons for including source code escrow terms in the application vendor agreement?
What are the main reasons for including source code escrow terms in the application vendor agreement?A . Make sure the source code remains availableB . Isolation system development and on-site environmentC . Protecting companies from copyright disputesD . Make sure the source code changes are recordedView AnswerAnswer: A
If you ask management to issue a report on IT internal control measures to stakeholders, which of the following is the benefit of doing so?
If you ask management to issue a report on IT internal control measures to stakeholders, which of the following is the benefit of doing so?A . Cost transparencyB . Improve project portfolio managementC . Concerns about IT governanceD . Improve cost managementView AnswerAnswer: C
Which of the following can minimize the risk of business process disruption when replacing a key-key software application?
Which of the following can minimize the risk of business process disruption when replacing a key-key software application?A . Big-bang implementationB . Parallel implementationC . Pilot implementationD . Incremental implementationView AnswerAnswer: B
In conducting vulnerability assessments, information systems auditors found a high-risk vulnerability in a public-facing web server for processing online customers paying for orders with credit cards.
In conducting vulnerability assessments, information systems auditors found a high-risk vulnerability in a public-facing web server for processing online customers paying for orders with credit cards. Information system auditors should first:A . Notify the management.B . Redesign the customer order process.C . Record the findings in the reportD ....
The most significant reason for using key performance indicators (KPI) to track IT projects against their initial goals is?
The most significant reason for using key performance indicators (KPI) to track IT projects against their initial goals is?A . Decisions affecting management outsourcing IT projectsB . Identify which projects may require additional fundingC . Identify situations in which stakeholder involvement needs to be strengthenedD . Provide timely instructions...