Cancel
TopicsDown
Products Down
Follow Us:
FacebookTwitter
Advertisement
Hemangdoshi
Answered: Sep 28, 2020
D. read-only access to source code.

An important purpose of library control software is to allow read-only access to source code. Choices A, B and C are activities which library control...Read More

1 Answer

510 views
Hemangdoshi
Answered: Sep 28, 2020
B. Reviewing system log files

Reviewing system log files is the only trail that may provide information about the unauthorized activities in the production library. Source and object code...Read More

1 Answer

426 views
Hemangdoshi
Answered: Sep 28, 2020
C. require that changes after that point be evaluated for cost-effectiveness.

Projects often have a tendency to expand, especially during the requirements definition phase. This expansion...Read More

1 Answer

413 views
Hemangdoshi
Answered: Sep 28, 2020
D. vulnerability.

The lack of adequate security controls represents a vulnerability, exposing sensitive information and data to the risk of malicious damage, attack or unauthorized access...Read More

1 Answer

412 views
Christian Jackson, Content Developer
Answered: Aug 28, 2018
The OSI model is included in the computer software systems within the computers. The main function with the OSI model involves communication. This model contains many layers that perform certain...Read More

3 Answers

397 views
Hemangdoshi
Answered: Sep 28, 2020
C. compares processing output with independently calculated data.

An integrated test facility is considered a useful audit tool because it uses the same programs to compare processing using...Read More

1 Answer

394 views
Hemangdoshi
Answered: Sep 28, 2020
D. outline the overall authority, scope and responsibilities of the audit function.

An audit charter should state managements objectives for and delegation of authority to IS audit. This...Read More

1 Answer

355 views
F. Ray, Student
Answered: Sep 25, 2018
When an organization outsources it IS sources it is important that certain functions are performed by the IS management. Perhaps the most important function of the IS management is monitoring the...Read More

3 Answers

345 views
Hemangdoshi
Answered: Sep 28, 2020
A. during the initial planning stages of the project.

It is extremely important that the project be planned properly and that the specific phases and deliverables be identified during the...Read More

1 Answer

343 views
E. Austin
Answered: Jan 03, 2019
The most critical step while planning an audit is performing a risk assessment. ISACA IS Audit and Assurance Standard 1202 require risk assessment as per the statement 1202.2, where IS audit and...Read More

2 Answers

341 views
Hemangdoshi
Answered: Sep 28, 2020
D. describe the authority and responsibilities of the audit department.

The audit charter typically sets out the role and responsibility of the internal audit department. It should state...Read More

1 Answer

338 views
Hemangdoshi
Answered: Sep 28, 2020
A. Implement data backup and recovery procedures.

Implementing data backup and recovery procedure is a corrective control, because backup and recovery procedures can be used to roll back...Read More

1 Answer

333 views
Hemangdoshi
Answered: Sep 28, 2020
B. To provide a method of controlling costs and schedules and to ensure communication among users, IS auditors, management and IS personnel

A well-defined systems development methodology...Read More

1 Answer

333 views
Hemangdoshi
Answered: Sep 28, 2020
B. Identification of network applications to be externally accessed

Explanation: Identification of the applications required across the network should be identified first. After...Read More

1 Answer

331 views
Hemangdoshi
Answered: Sep 28, 2020
B. management.

Management is ultimately responsible for effectiveness of internal control mechanism. Designing, implementing and maintaining a system of internal controls, including the...Read More

1 Answer

330 views

Related Topics Of CISA

Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.