Which of the following would be included in an IS strategic
plan?

Answers were Sorted based on User's Feedback



Which of the following would be included in an IS strategic plan?..

Answer / burhan babeker homaida

Analysis of future business opjectives

Is This Answer Correct ?    35 Yes 2 No

Which of the following would be included in an IS strategic plan?..

Answer / aravind

A. Specifications for planned hardware purchases
B. Analysis of future business objectives
C. Target dates for development projects
D. Annual budgetary targets for the IS department

Is This Answer Correct ?    10 Yes 2 No

Which of the following would be included in an IS strategic plan?..

Answer / khalid

Analysis of future business opjectives

Is This Answer Correct ?    6 Yes 4 No

Which of the following would be included in an IS strategic plan?..

Answer / hifzurrehman

Analysis of future business opjectives

Is This Answer Correct ?    3 Yes 1 No

Which of the following would be included in an IS strategic plan?..

Answer / guest

Long term and short term plans to meet overal business
objective.

Is This Answer Correct ?    2 Yes 1 No

Which of the following would be included in an IS strategic plan?..

Answer / guest

Future business objectives

Is This Answer Correct ?    1 Yes 2 No

Which of the following would be included in an IS strategic plan?..

Answer / burhan babeker homaida

Target dates for development projects

Is This Answer Correct ?    1 Yes 10 No

Post New Answer

More CISA Certification Interview Questions

Which of the following provides a mechanism for coding and compiling programs interactively? A. Firmware B. Utility programs C. Online programming facilities D. Network management software

1 Answers  


Which of the following data validation edits is effective in detecting transposition and transcription errors? A. Range check B. Check digit C. Validity check D. Duplicate check

1 Answers  


The purpose for requiring source code escrow in a contractual agreement is to: A. ensure the source code is available if the vendor ceases to exist. B. permit customization of the software to meet specified business requirements. C. review the source code for adequacy of controls. D. ensure the vendor has complied with legal requirements.

1 Answers  


Which of the following would an IS auditor consider the MOST relevant to short-term planning for the IS department? A. Allocating resources B. Keeping current with technology advances C. Conducting control self-assessment D. Evaluating hardware needs

1 Answers  


The primary role of an IS auditor during the system design phase of an application development project is to: A. advise on specific and detailed control procedures. B. ensure the design accurately reflects the requirement. C. ensure all necessary controls are included in the initial design. D. advise the development manager on adherence to the schedule.

1 Answers  






An organization wants to enforce data integrity principles and achieve faster performance/execution in a database application. Which of the following design principles should be applied? A. User (customized) triggers B. Data validation at the front end C. Data validation at the back end D. Referential integrity

1 Answers  


Facilitating telecommunications continuity by providing redundant combinations of local carrier T-1 lines, microwaves and/or coaxial cables to access the local communication loop is: A. last mile circuit protection. B. long haul network diversity. C. diverse routing. D. alternative routing.

1 Answers  


A utility is available to update critical tables in case of data inconsistency. This utility can be executed at the OS prompt or as one of menu options in an application. The BEST control to mitigate the risk of unauthorized manipulation of data is to: A. delete the utility software and install it as and when required. B. provide access to utility on a need-to-use basis. C. provide access to utility to user management D. define access so that the utility can be only executed in menu option.

2 Answers  


In a risk-based audit approach, an IS auditor should FIRST complete :

7 Answers  


Which of the following would be included in an IS strategic plan?

7 Answers   Deloitte,


When a complete segregation of duties cannot be achieved in an online system environment, which of the following functions should be separated from the others? A. Origination B. Authorization C. Recording D. Correction

1 Answers  


A primary function of risk management is the identification of cost-effective controls. In selecting appropriate controls, which of the following methods is best to study the effectiveness of adding various safeguards in reducing vulnerabilities? A. "What if" analysis B. Traditional cost/benefit analysis C. Screening analysis D. A "back-of-the-envelope" analysis

1 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)