An IS Auditor reviewing the results of a test of the disaster recovery plan conducted at a warm site notes that clients were unable to log-on to the restored on-line systems as there were insufficient data lines connecting the client premises to the recovery site. The MOST likely conclusion that the IS auditor would draw is that the:
An IS Auditor discovers that an information processing facility's business continuity plan provides for an alternate processing site which will accommodate fifty percent of the primary processing facility's processing capability. Based on this discovery, which of the following actions should the IS auditor take?
When attempting to assess financial risk when accurate financial impact cannot be determined, which of the following is the MOST appropriate approach to risk assessment?
To which of the following should an IS auditor give the MOST consideration when auditing systems affected by a recent business process re-engineering (BPR) project?
A company is backing up its transactional database to an offsite location. Which of the following is the MOST important issue if the backups are not kept up-to-date and fully synchronized with the live transaction-processing databases?
These are steps included in business process re-engineering: a) Gain an understanding of the business process to be reviewed, b) Establish a continuous improvement process, c) Redesign and streamline the process, d) Define the areas to be reviewed, e) Implement and monitor the new process, f) Develop a project plan. What is the proper sequence of these steps?
Which of the following processes is MOST important to ensure that implementation of applications and systems is optimized to the organization's goals and objectives?
When assessing the potential scope of an application-development project, which of the following provides the most reliable estimate of the size of an information system?
In planning a new software-application development project, function point analysis (FPA) can be used to understand the potential size of a projected application. Which of the following best describes how FPA works?
An IS auditor is reviewing an organization's change-development process and finds that the development calls for using fourth-generation programming languages (4GLs). Which of the following statements is NOT true regarding 4GLs?
An organization's software-development projects are planned according to formal software Development Life Cycle (SDLC) processes. In which of the following phases would the software-development project's baselines and scope be established?
Software library control ensures that application programmers never have access to production application processing and that users do not have access to source code. Which of the following statements is NOT true regarding the software librarian's access to code or data?
The use of decision trees implemented by leading users through a series of questions or choices from a knowledge base to compute a logical finding is implemented by which of the following?
Critical real-time data such as that associated with transaction processing requires special backup procedures. Which of the following is recommended for backing up transaction-processing files?
Disaster recovery planning often comes down to a compromise between cost and target recovery times. Which of the following statements is true regarding this compromise?
The organization desires to ensure integrity, authenticity, and nonrepudiation of emails for sensitive communications between security administration and network administration personnel through the use of digitally signed emails. Which of the following is a valid step in signing an email with keys from a digital certificate?
Welcome to Sciemce, where you can ask questions and receive answers from other members of the community.