Search Header Logo

Activity2

Authored by muhammad usman

Computers

Professional Development

Used 1+ times

Activity2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a risk based audit where both inherent and control risks have been assessed as high, and IS auditor will most likely perform:

Substantive Testing

Compliance Testing

Discovery Sampling

Stop-or-Go Sampling

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

An IS Auditor notes unapproved IT policies, but notes employees strictly following these policies. The IS auditor should:

Ignore it because employees follow policies strictly

Recommend immediate approval of policies

Emphasize the approval of policies to management

Report the absence of documented approval of policies

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is the best reason for placing conditions on secondary employment of IT employees:

to prevent misuse of corporate resources

to prevent conflict of interest

to prevent employee performance issues

to prevent theft of IT assets and information of the company

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

While reviewing information security policy, which of the following is of the BIGGEST concern for the IS Auditor:

The policy has not been updated in more than one year

The policy includes no revision history

Policy is approved by security administrator

No information security policy committee was formed to draft the policy

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

An IS Auditor is reviewing the software development methodology of an organization that has adopted Agile methodology. IS Auditor will be MOST concerned with:

Certain Iterations producing unfinished code

Not extensive documentation

Continuous preplanning of the project

Managers do not mange project resources, delegating these to team members

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Two factor authentication can be circumvented through which of the following attacks:

Denial of Service

Man-in-the-Middle

Brute force

keylogging

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following anti-spam filtering methods has the lowest possibility of false positive alerts?

Rule based

check sum based

heuristic filtering

Statistic based

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?