As a business process reengineering (BPR) project takes hold
it is expected that:

A. business priorities will remain stable.

B. information technologies will not change.

C. the process will improve product, service and profitability.

D. input from clients and customers will no longer be necessary.

Answers were Sorted based on User's Feedback



As a business process reengineering (BPR) project takes hold it is expected that: A. business pr..

Answer / guest

Answer: C

As a reengineering process takes hold, certain key results
will begin to emerge, including a concentration on process
as a means of improving product, service and profitability.
In addition, new business priorities and approaches to the
use of information as well as powerful and more accessible
information technologies will emerge. Often, the roles of
client and customers will be redefined providing them with
more direct and active participation in the enterprise's
business process.

Is This Answer Correct ?    4 Yes 0 No

As a business process reengineering (BPR) project takes hold it is expected that: A. business pr..

Answer / rajathi

As a business process reengineering (BPR) project takes
hold it is expected that: A. business priorities will
remain stable. B. information technologies will not change.
C. the process will improve product, service and
profitability. D. input from clients and customers will no
longer be necessary.

Is This Answer Correct ?    0 Yes 0 No

As a business process reengineering (BPR) project takes hold it is expected that: A. business pr..

Answer / rajathi

the process will improve product.any customer or owner
accepts only our product is improved.
then that improved product will gives more profit for them.
so all the process will improve product,service and
profitably

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More CISA Certification Interview Questions

The risk that an IS auditor uses an inadequate test procedure and concludes that material errors do not exist when, in fact, they do, is an example of: A. inherent risk. B.control risk. C. detection risk. D. audit risk.

1 Answers  


hello all i want to do cisa certification but dont have knowledge of auditing. i m fresher and ccna certified. so, please advice me how should i prepare .and having cisa certification is it easy to get a job. please reply as soon as possible.

1 Answers  


Which of the following is a measure of the size of an information system based on the number and complexity of a system's inputs, outputs and files? A. Program evaluation review technique (PERT) B. Rapid application development (RAD) C. Function point analysis (FPA) D. Critical path method (CPM)

1 Answers  


Which of the following tests performed by an IS auditor would be the MOST effective in determining compliance with an organization's change control procedures? A. Review software migration records and verify approvals. B. Identify changes that have occurred and verify approvals. C. Review change control documentation and verify approvals. D. Ensure that only appropriate staff can migrate changes into production.

1 Answers  


When performing a review of the structure of an electronic funds transfer (EFT) system, an IS auditor observes that the technological infrastructure is based on a centralized processing scheme that has been outsourced to a provider in another country. Based on this information, which of the following conclusions should be the main concern of the IS auditor? A. There could be a question with regards to the legal jurisdiction. B. Having a provider abroad will cause excesive costs in future audits. C. The auditing process will be difficult because of the distances. D. There could be different auditing norms.

2 Answers  






Which of the following devices extends the network and has the capacity to store frames and act as a storage and forward device? A. Router B. Bridge C. Repeater D. Gateway

1 Answers  


Which of the following is the MOST fundamental step in effectively preventing a virus attack? A. Executing updated antivirus software in the background on a periodic basis B. Buying standard antivirus software, which is installed on all servers and workstations C. Ensuring that all software is checked for a virus in a separate PC before being loaded into the production environment D. Adopting a comprehensive antivirus policy and communicating it to all users

1 Answers  


The information that requires special precaution to ensure integrity is termed? A. Public data B. Private data C. Personal data D. Sensitive data

1 Answers  


When conducting an audit of client/server database security, the IS auditor would be MOST concerned about the availability of: A. system utilities. B. application program generators. C. system security documentation. D. access to stored procedures.

2 Answers  


In an EDI process, the device which transmits and receives electronic documents is the: A. communications handler. B. EDI translator. C. application interface. D. EDI interface.

1 Answers  


The editing/validation of data entered at a remote site would be performed MOST effectively at the: A. central processing site after running the application system. B. central processing site during the running of the application system. C. remote processing site after transmission to the central processing site. D. remote processing site prior to transmission of the data to the central processing site.

1 Answers  


Which of the following is a form of an Internet attack? A. Searching for software design errors B. Guessing user passwords based on their personal information C. Breaking the deadman's door to gain entry D. Planting a trojan horse

1 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)