Which of the following is a continuity plan test that uses
actual resources to simulate a system crash to
cost-effectively obtain evidence about the plan's effectiveness?

A. Paper test

B. Post test

C. Preparedness test

D. Walk-through

Answers were Sorted based on User's Feedback



Which of the following is a continuity plan test that uses actual resources to simulate a system cr..

Answer / guest

Answer: C

A preparedness test is a localized version of a full test,
wherein resources are expended in the simulation of a system
crash. This test is performed regularly on different aspects
of the plan and can be a cost-effective way to gradually
obtain evidence about the plan's effectiveness. It also
provides a means to improve the plan in increments. A paper
test is a walkthrough of the plan, involving major players
in the plan's execution who attempt to determine what might
happen in a particular type of service disruption. A paper
test usually precedes the preparedness test. A post-test is
actually a test phase and is comprised of a group of
activities, such as returning all resources to their proper
place, disconnecting equipment, returning personnel and
deleting all company data from third-party systems. A
walk-through is a test involving a simulated disaster
situation that tests the preparedness and understanding of
management and staff, rather than the actual resources.

Is This Answer Correct ?    3 Yes 0 No

Which of the following is a continuity plan test that uses actual resources to simulate a system cr..

Answer / guest

C. Preparedness test

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More CISA Certification Interview Questions

When reviewing a service level agreement for an outsourced computer center an IS auditor should FIRST determine that: A. the cost proposed for the services is reasonable. B. security mechanisms are specified in the agreement. C. the services in the agreement are based on an analysis of business needs. D. audit access to the computer center is allowed under the agreement.

1 Answers  


An IS auditor conducting an access controls review in a client-server environment discovers that all printing options are accessible by all users. In this situation, the IS auditor is MOST likely to conclude that: A. exposure is greater since information is available to unauthorized users. B. operating efficiency is enhanced since anyone can print any report, any time. C. operating procedures are more effective since information is easily available. D. user friendliness and flexibility is facilitated since there is a smooth flow of information among users.

2 Answers  


IS auditors are MOST likely to perform compliance tests of internal controls if, after their initial evaluation of the controls, they conclude that: A. a substantive test would be too costly. B. the control environment is poor. C. inherent risk is low. D. control risks are within the acceptable limits.

2 Answers  


An organization is considering installing a LAN in a site under construction. If system availability is the main concern, which of the following topologies is MOST appropriate? A. Ring B. Line C. Star D. Bus

1 Answers  


The PRIMARY objective of an IS audit function is to: A. determine whether everyone uses IS resources according to their job description. B. determine whether information systems safeguard assets, and maintain data integrity. C. examine books of accounts and relative documentary evidence for the computerized system. D. determine the ability of the organization to detect fraud.

1 Answers  






In a LAN environment, which of the following minimizes the risk of data corruption during transmission? A. Using end-to-end encryption for data communication B. Using separate conduits for electrical and data cables C. Using check sums for checking the corruption of data D. Connecting the terminals using a star topology

1 Answers  


Which of the following would be considered an essential feature of a network management system? A. A graphical interface to map the network topology B. Capacity to interact with the Internet to solve the problems C. Connectivity to a help desk for advice on difficult issues D. An export facility for piping data to spreadsheets

1 Answers  


The window of time recovery of information processing capabilities is based on the: A. criticality of the processes affected. B. quality of the data to be processed. C. nature of the disaster. D. applications that are mainframe based.

1 Answers  


Which of the following is the operating system mode in which all instructions can be executed? A. Problem B. Interrupt C. Supervisor D. Standard processing

1 Answers  


To check the performance of flow and error control, an IS auditor should focus the use of a protocol analyzer on which of the following layers? A. Network B. Transport C. Data link D. Application

2 Answers  


Which of the following controls would be MOST effective in ensuring that production source code and object code are synchronized? A. Release-to-release source and object comparison reports B. Library control software restricting changes to source code C. Restricted access to source code and object code D. Date and time-stamp reviews of source and object code

2 Answers  


During which of the following steps in the business process reengineering should the benchmarking team visit the benchmarking partner? A. Observation B. Planning C. Analysis D. Adaptation

2 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)