The IS department of an organization wants to ensure that
the computer files, used in the information processing
facility, are backed up adequately to allow for proper
recovery. This is a/an:
A. control procedure.
B. control objective.
C. corrective control.
D. operational control.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
IS control objectives specify the minimum set of controls to
ensure efficiency and effectiveness in the operations and
functions within an organization. Control procedures are
developed to provide reasonable assurance that specific
objectives will be achieved. A corrective control is a
category of controls, which aims to minimizing the threat
and/or remedy problems that were not prevented or were not
initially detected. Operational controls address the
day-to-day operational functions and activities, and aid in
ensuring that the operations are meeting the desired
business objectives.
Is This Answer Correct ? | 10 Yes | 0 No |
The act that describes a computer intruder capturing a stream of data packets and inserting these packets into the network as if it were another genuine message stream is called: A. eavesdropping. B. message modification. C. a brute-force attack. D. packet replay.
Which of the following concerns about the security of an electronic message would be addressed by digital signatures? A. Unauthorized reading B. Theft C. Unauthorized copying D. Alteration
The PRIMARY reason for replacing checks (cheques) with EFT systems in the accounts payable area is to: A. make the payment process more efficient. B. comply with international EFT banking standards. C. decrease the number of paper-based payment forms. D. reduce the risk of unauthorized changes to payment transactions.
Which of the following is a technique that could be used to capture network user passwords? A. Encryption B. Sniffing C. Spoofing D. A signed document cannot be altered.
The use of coding standards is encouraged by IS auditors because they: A. define access control tables. B. detail program documentation. C. standardize dataflow diagram methodology. D. ensure compliance with field naming conventions.
In planning a software development project, which of the following is the MOST difficult to determine? A. Project slack times B. The project's critical path C. Time and resource requirements for individual tasks D. Relationships that preclude the start of an activity before others are complete
A PRIMARY benefit derived from an organization employing control self-assessment (CSA) techniques is that it: A. can identify high-risk areas that might need a detailed review later. B. allows IS auditors to independently assess risk. C. can be used as a replacement for traditional audits. D. allows management to relinquish responsibility for control.
The security level of a private key system depends on the number of: A. encryption key bits. B. messages sent. C. keys. D. channels used.
Information requirement definitions, feasibility studies and user requirements are significant considerations when: A. defining and managing service levels. B. identifying IT solutions. C. managing changes. D. assessing internal IT control.
The MOST important responsibility of a data security officer in an organization is: A. recommending and monitoring data security policies. B. promoting security awareness within the organization. C. establishing procedures for IT security policies. D. administering physical and logical access controls.
The use of statistical sampling procedures helps minimize: A. sampling risk. B. detection risk. C. inherent risk. D. control risk.
1. which of the following is used to achieve accountability. a.identification b. authentication c. authorization d. iniation