The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:

The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:A . is more effective at suppressing flames. B. allows more time to abort release of the suppressant. C. has a decreased risk of leakage. D. disperses dry chemical suppressants exclusively.View AnswerAnswer:...

August 14, 2023 No Comments READ MORE +

Which audit approach is MOST helpful in optimizing the use of IS audit resources?

Which audit approach is MOST helpful in optimizing the use of IS audit resources?A . Agile auditing B. Continuous auditing C. Outsourced auditing D. Risk-based auditingView AnswerAnswer: D

August 14, 2023 No Comments READ MORE +

Cross-site scripting (XSS) attacks are BEST prevented through:

Cross-site scripting (XSS) attacks are BEST prevented through:A . application firewall policy settings. B. a three-tier web architecture. C. secure coding practices. D. use of common industry frameworks.View AnswerAnswer: C

August 14, 2023 No Comments READ MORE +

Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?

Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?A . To determine whether project objectives in the business case have been achieved B. To ensure key stakeholder sign-off has been obtained C. To align project objectives with business needs D. To document lessons...

August 14, 2023 No Comments READ MORE +

Which of the following is MOST important to include in forensic data collection and preservation procedures?

Which of the following is MOST important to include in forensic data collection and preservation procedures?A . Assuring the physical security of devices B. Preserving data integrity C. Maintaining chain of custody D. Determining tools to be usedView AnswerAnswer: B

August 14, 2023 No Comments READ MORE +

Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?

An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations...

August 14, 2023 No Comments READ MORE +

Which of the following is MOST important for an IS auditor to understand when reviewing this decision?

An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?A . The current business capabilities delivered by the legacy system B. The proposed network topology...

August 14, 2023 No Comments READ MORE +

Which of the following would be a result of utilizing a top-down maturity model process?

Which of the following would be a result of utilizing a top-down maturity model process?A . A means of benchmarking the effectiveness of similar processes with peers B. A means of comparing the effectiveness of other processes within the enterprise C. Identification of older, more established processes to ensure timely...

August 14, 2023 No Comments READ MORE +

Which of the following is the BEST detective control for a job scheduling process involving data transmission?

Which of the following is the BEST detective control for a job scheduling process involving data transmission?A . Metrics denoting the volume of monthly job failures are reported and reviewed by senior management. B. Jobs are scheduled to be completed daily and data is transmitted using a Secure File Transfer...

August 14, 2023 No Comments READ MORE +

From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?

From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?A . Inability to close unused ports on critical servers B. Inability to identify unused licenses within the organization C. Inability to deploy updated security patches...

August 13, 2023 No Comments READ MORE +