Which of the following is a continuity plan test that uses
actual resources to simulate a system crash to
cost-effectively obtain evidence about the plan's effectiveness?
A. Paper test
B. Post test
C. Preparedness test
D. Walk-through
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
A preparedness test is a localized version of a full test,
wherein resources are expended in the simulation of a system
crash. This test is performed regularly on different aspects
of the plan and can be a cost-effective way to gradually
obtain evidence about the plan's effectiveness. It also
provides a means to improve the plan in increments. A paper
test is a walkthrough of the plan, involving major players
in the plan's execution who attempt to determine what might
happen in a particular type of service disruption. A paper
test usually precedes the preparedness test. A post-test is
actually a test phase and is comprised of a group of
activities, such as returning all resources to their proper
place, disconnecting equipment, returning personnel and
deleting all company data from third-party systems. A
walk-through is a test involving a simulated disaster
situation that tests the preparedness and understanding of
management and staff, rather than the actual resources.
| Is This Answer Correct ? | 3 Yes | 0 No |
The most common problem in the operation of an intrusion detection system (IDS) is: A. the detection of false positives. B. receiving trap messages. C. reject error rates. D. denial-of-service attacks.
When performing an audit of access rights, an IS auditor should be suspicious of which of the following if allocated to a computer operator? A. READ access to data B. DELETE access to transaction data files C. Logged READ/EXECUTE access to programs D. UPDATE access to job control language/script files
purchase orders issued to vendors have been authorized as per the authorization matrix
An IS auditor is conducting substantive audit tests of a new accounts receivable module. The IS auditor has a tight schedule and limited computer expertise. Which would be the BEST audit technique to use in this situation? A. Test data B. Parallel simulation C. Integrated test facility D. Embedded audit module
An organization provides information to its supply-chain partners and customers through an extranet infrastructure. Which of the following should be the GREATEST concern to an IS auditor reviewing the firewall security architecture? A. A secure socket layer (SSL) has been implemented for user authentication and remote administration of the firewall. B. On the basis of changing requirements, firewall policies are updated. C. Inbound traffic is blocked unless the traffic type and connections have been specifically permitted. D. The firewall is placed on top of the commercial operating system with all installation options.
The secure socket layer (SSL) protocol addresses the confidentiality of a message through: A. symmetric encryption. B. message authentication code. C. hash function. D. digital signature certificates.
During a review of the controls over the process of defining IT service levels, an IS auditor would MOST likely interview the: A. systems programmer. B. legal staff. C. business unit manager. D. application programmer.
Which of the following network topologies yields the GREATEST redundancy in the event of the failure of one node? A. Mesh B. Star C. Ring D. Bus
The intent of application controls is to ensure that when inaccurate data is entered into the system, the data is: A. accepted and processed. B. accepted and not processed. C. not accepted and not processed. D. not accepted and processed.
Congestion control is BEST handled by which OSI layer? A. Data link B. Session layer C. Transport layer D. Network layer
Which of the following provisions in a contract for external information systems services would an IS auditor consider to be LEAST significant? A. Ownership of program and files B. Statement of due care and confidentiality C. Continued service of outsourcer in the event of a disaster D. Detailed description of computer hardware used by the vendor
Which of the following would be included in an IS strategic plan?