Practice Quiz
Sign in to Google to save your progress. Learn more
After you enter a purchase order in an on-line system, you get the message, “The request could not be processed due to lack of funds in your budget”. This is an example of error? *
1 point
Which of the following procedures would MOST effectively detect the loading of illegal software packages onto a network? *
1 point
For effective computer capacity planning the most essential activity is: *
1 point
In a risk-based audit approach, an IS auditor, in addition to risk, would be influenced by: *
1 point
An IS auditor reviewing a proposed application software acquisition should ensure that the: *
1 point
Which of the following is a benefit of a risk-based approach to audit planning? *
1 point
Which of the following is a risk of availing cloud computing services? *
1 point
Which of the following is most important critical success factor for ERP? *
1 point
Overall business risk for a particular threat can be expressed as *
1 point
The MAJOR advantage of the risk assessment approach over the baseline approach to information security management is that it ensures: *
1 point
Which of the following is a substantive test? *
1 point
Which of the following is NOT generally considered a category of Audit Risk? *
1 point
The most common reason for the failure of information systems to meet the needs of users is that: *
1 point
What means the rate at which opinion of the IS Auditor would change if he selects a larger sample size? *
1 point
The decision and actions of an IS Auditor are most likely to affect which of the following *
1 point
An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following situations may have impaired the independence of the IS auditor? The IS auditor: *
1 point
Reviewing management's long-term strategic plans helps the IS auditor: *
1 point
Which of the following is not a type of internal controls? *
1 point
A Company selling used computers would ensure that: *
1 point
The PRIMARY advantage of a continuous audit approach is that it: *
1 point
Which of the following would be of concern for an information system auditor auditing BPO (Business Process Outsourcing) Service provider? *
1 point
Senior management has requested that an IS auditor assist the departmental management in the implementation of necessary controls. The IS auditor should: *
1 point
An audit charter should: *
1 point
An IS auditor is reviewing access to an application to determine whether the 10 most recent "new user" forms were correctly authorized. This is an example of *
1 point
From the perspective of Hardware maintenance, which is the best option?MTBF stands for "Mean Time between Failures" and MTTR stands for "Mean Time to recover" *
1 point
To Take care of e-waste regulations we need: *
1 point
Which of the following is the MOST likely reason why e-mail systems have become a useful source of evidence for litigation? *
1 point
Which of the following sampling methods is MOST useful when testing for compliance? *
1 point
When choosing off-the-shelf software, which of the following are the two most important criteria? *
1 point
Which of the following are most commonly used to mitigate risks discovered by organizations? *
1 point
Submit
Clear form
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy