Topic 1: Exam Pool A
During an external assessment of network vulnerability which of the following activities should be performed FIRST
A.
implement an intrusion detection system (IDS)
B.
Review policies
C.
Monitor the network
D.
Collect network information
Review policies
The BEST way to evaluate the effectiveness of a newly developed application is to:
A.
perform a post-implementation review,
B.
review acceptance-testing results
C.
analyze load-testing results,
D.
perform a pre-implementation renew.
review acceptance-testing results
While planning a security audit, an IS auditor is made aware of a security review carried out by external consultants. It is MOST implement for the auditor to:
A.
Re-perform the security review
B.
Asses the objectively and competence of the consultant
C.
Review similar reports issued by the consultants.
D.
Accept the finding and conclusion of the consultants
Review similar reports issued by the consultants.
Which of the following procedures would BEST contribute to the reliability of information in a data warehouse?
A.
Retaining only current data.
B.
Maintain archive data
C.
Maintaining current metadata
D.
Storing only a single type of data
Maintaining current metadata
Which of the following will BEST help to ensure that an in-house application in the production environment is current?
A.
Version control procedures
B.
Change management
C.
Production access control
D.
Quality assurance
Version control procedures
Page 8 out of 204 Pages |
Previous |