ASI 3

ASI 3

University

14 Qs

quiz-placeholder

Similar activities

ICT0513 - THE INTERNET & THE WEB (MCQ)

ICT0513 - THE INTERNET & THE WEB (MCQ)

University

15 Qs

MIS_Quiz_1

MIS_Quiz_1

University

15 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Information Assurance Final Quiz

Information Assurance Final Quiz

University

15 Qs

Cloud Computing

Cloud Computing

KG - Professional Development

11 Qs

Week 8 UOL

Week 8 UOL

University

10 Qs

Basic of Cloud Computing

Basic of Cloud Computing

University

15 Qs

Job roles in IT technical support and management

Job roles in IT technical support and management

11th Grade - Professional Development

18 Qs

ASI 3

ASI 3

Assessment

Quiz

Computers

University

Hard

Created by

A.R. Wirawan

Used 66+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An IS auditor is to assess the suitability of a service level agreement (SLA) between the organization and the supplier of outsourced services. To which of the following observations should the IS auditor pay the MOST attention? The SLA does not contain a:

Transition clause from the old supplier to a new supplier in the case of expiration or termination.

Late payment clause between the customer and the supplier

Contractual commitment for service improvement

Dispute resolution procedure between the contracting parties

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An IS auditor reviewing a new outsourcing contract with a service provider would be MOST concerned if which of the following was missing?

A clause providing a “right to audit” service provider

A clause defining penalty payments for poor performance

Predefined service level report templates

A clause regarding supplier limitation of liability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When reviewing the desktop software compliance of an organization, the IS auditor should be MOST concerned if the installed software:

Was installed, but not documented in the IT department records

Was installed and the license has expired

Is not listed in the approved software standards document

License will expire in next 15 days

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Due to a recent economic downturn, an IT organization has terminated several administrators at remote sites and consolidated all IT administration to the organization’s central headquarters. During the annual IT audit, the auditor determines that the organization has implemented remote admin connectivity to each site using low-cost DSL connections and an automated SNMP-based monitoring system to detect any hardware or software issues that may occur.


In the auditor’s mind, what should be the biggest area of concern?

The authentication methods used for the remote admin may not be secure and default SNMP passwords may be in use

Physical security at remote sites may not be adequate

Terminated employees may retain access to systems at remote sites

The connection to remote sites is secure through the use of a virtual private network (VPN)

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An IT executive of an insurance company asked an external auditor to evaluate the user IDs for emergency access (fire call ID). The IS auditor found that fire call accounts are granted without a predefined expiration date. What should the IS auditor recommend?

Review of the access control privilege authorization process

Implementation of an identity management system (IMS)

Enhancement of procedures to audit changes made to sensitive customer data

Granting of fire call accounts only to managers

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During an application audit, an IS auditor is asked to provide assurance of the database referential integrity. Which of the following should be reviewed?

Field definition

Master table definition

Composite keys

Foreign key structure

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An IS auditor is reviewing database security for an organization. Which of the following is the MOST important consideration for database hardening?

The default configurations are changed

All tables in the database are normalized

Stored procedures and triggers are encrypted

The service port used by the database server is changed

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?