Activity2

Activity2

Professional Development

15 Qs

quiz-placeholder

Similar activities

Security Headers

Security Headers

Professional Development

10 Qs

Implementing Cloud Security

Implementing Cloud Security

Professional Development

10 Qs

MS900 - Module 4 - Full Quiz

MS900 - Module 4 - Full Quiz

Professional Development

15 Qs

AWS-Basics

AWS-Basics

Professional Development

20 Qs

Level 5 - OSP Quiz

Level 5 - OSP Quiz

Professional Development

15 Qs

IT ENGLISH: Research Project Topics - MS Active Directory

IT ENGLISH: Research Project Topics - MS Active Directory

Professional Development

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Protecting Host Systems

Protecting Host Systems

11th Grade - Professional Development

16 Qs

Activity2

Activity2

Assessment

Quiz

Computers

Professional Development

Hard

Created by

muhammad usman

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a risk based audit where both inherent and control risks have been assessed as high, and IS auditor will most likely perform:

Substantive Testing

Compliance Testing

Discovery Sampling

Stop-or-Go Sampling

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

An IS Auditor notes unapproved IT policies, but notes employees strictly following these policies. The IS auditor should:

Ignore it because employees follow policies strictly

Recommend immediate approval of policies

Emphasize the approval of policies to management

Report the absence of documented approval of policies

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is the best reason for placing conditions on secondary employment of IT employees:

to prevent misuse of corporate resources

to prevent conflict of interest

to prevent employee performance issues

to prevent theft of IT assets and information of the company

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

While reviewing information security policy, which of the following is of the BIGGEST concern for the IS Auditor:

The policy has not been updated in more than one year

The policy includes no revision history

Policy is approved by security administrator

No information security policy committee was formed to draft the policy

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

An IS Auditor is reviewing the software development methodology of an organization that has adopted Agile methodology. IS Auditor will be MOST concerned with:

Certain Iterations producing unfinished code

Not extensive documentation

Continuous preplanning of the project

Managers do not mange project resources, delegating these to team members

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Two factor authentication can be circumvented through which of the following attacks:

Denial of Service

Man-in-the-Middle

Brute force

keylogging

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following anti-spam filtering methods has the lowest possibility of false positive alerts?

Rule based

check sum based

heuristic filtering

Statistic based

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?