ASI 3

ASI 3

University

14 Qs

quiz-placeholder

Similar activities

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

QUIS-2 IT AUDIT

QUIS-2 IT AUDIT

University

11 Qs

Software Engineering :TEST 2

Software Engineering :TEST 2

University

10 Qs

ADVACOMT-Quiz No.1 (final term)

ADVACOMT-Quiz No.1 (final term)

University

15 Qs

Firewall and Network Security

Firewall and Network Security

University

15 Qs

PBO Inheritance Episode 2

PBO Inheritance Episode 2

University

18 Qs

2.4 - 2.6

2.4 - 2.6

University

15 Qs

Week 4

Week 4

University

15 Qs

ASI 3

ASI 3

Assessment

Quiz

Computers

University

Hard

Created by

A.R. Wirawan

Used 66+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An IS auditor is to assess the suitability of a service level agreement (SLA) between the organization and the supplier of outsourced services. To which of the following observations should the IS auditor pay the MOST attention? The SLA does not contain a:

Transition clause from the old supplier to a new supplier in the case of expiration or termination.

Late payment clause between the customer and the supplier

Contractual commitment for service improvement

Dispute resolution procedure between the contracting parties

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An IS auditor reviewing a new outsourcing contract with a service provider would be MOST concerned if which of the following was missing?

A clause providing a “right to audit” service provider

A clause defining penalty payments for poor performance

Predefined service level report templates

A clause regarding supplier limitation of liability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When reviewing the desktop software compliance of an organization, the IS auditor should be MOST concerned if the installed software:

Was installed, but not documented in the IT department records

Was installed and the license has expired

Is not listed in the approved software standards document

License will expire in next 15 days

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Due to a recent economic downturn, an IT organization has terminated several administrators at remote sites and consolidated all IT administration to the organization’s central headquarters. During the annual IT audit, the auditor determines that the organization has implemented remote admin connectivity to each site using low-cost DSL connections and an automated SNMP-based monitoring system to detect any hardware or software issues that may occur.


In the auditor’s mind, what should be the biggest area of concern?

The authentication methods used for the remote admin may not be secure and default SNMP passwords may be in use

Physical security at remote sites may not be adequate

Terminated employees may retain access to systems at remote sites

The connection to remote sites is secure through the use of a virtual private network (VPN)

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An IT executive of an insurance company asked an external auditor to evaluate the user IDs for emergency access (fire call ID). The IS auditor found that fire call accounts are granted without a predefined expiration date. What should the IS auditor recommend?

Review of the access control privilege authorization process

Implementation of an identity management system (IMS)

Enhancement of procedures to audit changes made to sensitive customer data

Granting of fire call accounts only to managers

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During an application audit, an IS auditor is asked to provide assurance of the database referential integrity. Which of the following should be reviewed?

Field definition

Master table definition

Composite keys

Foreign key structure

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An IS auditor is reviewing database security for an organization. Which of the following is the MOST important consideration for database hardening?

The default configurations are changed

All tables in the database are normalized

Stored procedures and triggers are encrypted

The service port used by the database server is changed

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?