Search Header Logo

Basics of Information System Audit (IT Audits)

Authored by CA Saturday

Professional Development

1st Grade

Used 8+ times

Basics of Information System Audit (IT Audits)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of backup involves always storing copies of all files modified since the most recent full backup?

    Differential backups

Partial backup

    Incremental backup

   Database backup

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______ means the protection of data from modification by unknown users.

Confidentiality

Integrity

Authentication

Non-repudiation

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

How should management act to best deal with emergency changes?

    Emergency changes cannot be made without advance testing

    The change control process does not apply to emergency conditions

    All changes should still undergo review

    Emergency changes are not allowed under any condition

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

    If your concern is faster availability of an application, which of the following impacts the availability

RPO

RTO

Both

None

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  Firewalls are to protect against

Fire Attacks

Data Driven Attacks

Unauthorized Attacks

Virus Attacks

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is the best program for the protection of a company’s vital information resources from computer viruses?

Stringent corporate hiring policies for staff working with computerized functions

Existence of a software program for virus prevention.

Prudent management policies and procedures instituted in conjunction with technological safeguards

Physical protection devices in use for hardware, software, and library facilities

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

............................ refers to disabling of physical ports on a system

   Port Blocking

   End-Point Hardening

   Port Disablement

None

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?