Activity2
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
muhammad usman
Used 1+ times
FREE Resource
Enhance your content in a minute
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a risk based audit where both inherent and control risks have been assessed as high, and IS auditor will most likely perform:
Substantive Testing
Compliance Testing
Discovery Sampling
Stop-or-Go Sampling
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
An IS Auditor notes unapproved IT policies, but notes employees strictly following these policies. The IS auditor should:
Ignore it because employees follow policies strictly
Recommend immediate approval of policies
Emphasize the approval of policies to management
Report the absence of documented approval of policies
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following is the best reason for placing conditions on secondary employment of IT employees:
to prevent misuse of corporate resources
to prevent conflict of interest
to prevent employee performance issues
to prevent theft of IT assets and information of the company
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
While reviewing information security policy, which of the following is of the BIGGEST concern for the IS Auditor:
The policy has not been updated in more than one year
The policy includes no revision history
Policy is approved by security administrator
No information security policy committee was formed to draft the policy
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
An IS Auditor is reviewing the software development methodology of an organization that has adopted Agile methodology. IS Auditor will be MOST concerned with:
Certain Iterations producing unfinished code
Not extensive documentation
Continuous preplanning of the project
Managers do not mange project resources, delegating these to team members
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Two factor authentication can be circumvented through which of the following attacks:
Denial of Service
Man-in-the-Middle
Brute force
keylogging
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following anti-spam filtering methods has the lowest possibility of false positive alerts?
Rule based
check sum based
heuristic filtering
Statistic based
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
13 questions
Five Nights At Freddy's: Security Breach Quiz
Quiz
•
KG - Professional Dev...
10 questions
all star
Quiz
•
Professional Development
15 questions
Javascript basics
Quiz
•
Professional Development
16 questions
Keyboard Types
Quiz
•
Professional Development
20 questions
Tout savoir sur Windows Quiz 2
Quiz
•
Professional Development
10 questions
Handling sensitve information on conference calls
Quiz
•
Professional Development
15 questions
4.6.4 Logic Gates
Quiz
•
10th Grade - Professi...
10 questions
C++Quiz#1
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
How to Email your Teacher
Quiz
•
Professional Development
6 questions
3RD GRADE DECLARATION OF INDEPENDENCE EXIT TICKET
Quiz
•
Professional Development
19 questions
Black History Month Trivia
Quiz
•
6th Grade - Professio...
22 questions
Multiplying Exponents with the Same Base
Quiz
•
9th Grade - Professio...
40 questions
Flags of the World
Quiz
•
KG - Professional Dev...
