Quiz 3 IT delivery service

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

15 Which of the following specifically addresses how to detect cyber attacks against an organization's IT systems and how to recover from an attack? A. An incident response plan (IRP) B. An IT contingency plan C. A business continuity plan (BCP) D. A continuity of operations plan (COOP)

A. An incident response plan (IRP)

13 If a database is restored using before-image dumps, where should the process begin following an interruption? A. Before the last transaction B. After the last transaction C. As the first transaction after the latest checkpoint D. As the last transaction before the latest checkpoint

A. Before the last transaction

12 The PRIMARY purpose of business impact analysis (BIA) is to : A. Define recovery strategies B. Identify the alternate site C. Improve recovery testing D. Calculate the annual loss expectancy (ALE)

A. Define recovery strategies

3 Business Units are concerned about the performance of newly implemented system. Which of the following should an IS auditor recommend : A. Develop a baseline and monitor usage B. Define alternate processing procedures C. Prepare the maintenance manual D. Implement the changes users have suggested

A. Develop a baseline and monitor usage

8 Which of the following would have the HIGHEST priority in business continuity plan (BCP) ? A. Resuming critical process B. Recovering sensitive processes C. Restoring the site D. Relocating operations to an alternative site

A. Resuming critical process

1 While designing the business continuity plan (BCP) for an ailine reservation system, the MOST appropriate method of data transfer/backup at on offsite location would be: A. Shadow file processing B. Electronic vaulting C. Hard-disk mirroring D. Hoy-site provisioning

A. Shadow file processing

10 Which of the following is widely accepted as one of the critical components in networking management? A. configuration management B. Topological mappings C. Application of monitoring tools D. Proxy server troubleshooting

A. configuration management

6 Which of the following is MOST directly affected network performance monitoring tools ? A. Integrity B. Availability C. Completeness D. Confidentiality

B. Availability

4 In addition to the backup consideration for all systems, which of the following is an important consideration in providing backup for online systems A. Maintaining system software parameters B. Ensuring periodic dumps pf transaction logs C. Ensuring grandfather-father-son file backups D. Maintaining important data at offsite location

B. Ensuring periodic dumps pf transaction logs

5 In auditing a database environment, an IS auditor will be MOST concerned if the database administrator (DBA) is performing which of the following functions? A. Performing database changes according to change management procedures B. Installing patches or upgrades to the operating system C. Sizing table space and consulting on table join limitations Performing backup and recovery procedures

B. Installing patches or upgrades to the operating system

11 A number of system failures are occurring when corrections to previously detected errors are resubmitted for acceptance testing. This would indicate that the maintenance team is probably not performing adequately which of the following types of testing? A. Unit testing B. Integration testing C. Design walkthroughs D. Configuration management

B. Integration testing

19 In the event of the data center disaster, which of the following would be the MOST appropriate strategy to enable a complete recovery of critical database? A. Daily data backup to tape and storage at a remote site B. Real- time replication to a remote site C. Hard disk mirroring to a local server D. Real-time data backup to the local storage area network(SAN)

B. Real- time replication to a remote site

16 A programmer maliciously modified a production program to change data and then restored the original code. Which of the following would MOST effectively detect the malicious activity? A. Comparing code B. Reviewing system log files C. Comparing object code D. Reviewing executable and source code integrity

B. Reviewing system log files

14 In which of the following situations is it the MOST appropriate to implement data mirroring as the recovery strategy? A. Disaster tolerance is high A. The recovery time objective (RTO) is high B. The recovery point objective (RPO) is low C. The recovery point objective is high

B. The recovery point objective (RPO) is low

2 During an audit of application access, the IS auditor discovers that the systems administrator manages logical access to a critical application. The IS auditor should: A. Be concerned because the application owner should restrict to applications as required for users to perform their job B. Not be concerned because the systems administrator manages the application C. Be concerned because the information security function should restrict user access according to business requirement D. Not be concerned because the systems administrator knows which individuals should and should not have access to the application

C. Be concerned because the information security function should restrict user access according to business requirement

17 To address an organization's disaster recovery requirements, backup intervals should not exceed the : A. service level objective (SLO) B. Recovery time objective (RTO) C. Recovery point objective (RPO) D. Maximum acceptable outage (MAO)

C. Recovery point objective (RPO)

1 Which of the following is the BEST method for determining the criticality of each application system in the production environment? A. Interview the applicant programmers B. Perform a gap analysis C. Review the most recent application audits D. Perform a business impact analysis (BIA)

D. Perform a business impact analysis (BIA)

18 An organization has a number of branches across a wide geographical area. To ensure that all aspects of disaster recovery plan are evaluated in a cost effective manner, an IS auditor should recommend the use of a : A. Data recovery test B. Full operational test C. Posttest D. Preparedness test

D. Preparedness test

7 An organization is planning to deploy an outsourced cloud-based application that is used the track job applicant data for the human resources(HR) department. Which of the following should be the GREATEST concern to an IS auditor? A. The service level agreement (SLA) ensures strict limits for uptime an performance B. The cloud provider will not agree to an unlimited right-to-audit as part of the SLA C. The SLA is not explicit regarding the disaster recovery plan (DRP) capabilities of the cloud provider D. The cloud provider's data centers are in multiple cities and countries

D. The cloud provider's data centers are in multiple cities and countries

9 During a fieldwork observation of system administrative functions, an IS auditor discovered that changes made to the database after normal working hours required only an abbreviated number of steps compared to those made during normal working hours. Which of the following would be considered an adequate set of compensating controls? A. Use the privileged administrative account, log the changes and review the change log on the following day B. Use the normal user account to make changes, log the changes and review the change log on the following day C. Allow changes to be made only after granting access to an normal user account, and review the change log on the following day D. Use the database administrator DBA) user account to make changes, log the changes and review the change log on the following day

D. Use the database administrator (DBA) user account to make changes, log the changes and review the change log on the following day This question is tricky because before in another quiz for the same question it was the answer B


Set pelajaran terkait

IB Psychology : Research Methods

View Set

Class Hydrozoa, Scyphozoa, and Anthozoa

View Set

Medical Terminology (CSU, OT-215)

View Set