SlideShare ist ein Scribd-Unternehmen logo
1 von 101
2007 CISA   Review Course ,[object Object],[object Object]
Process Area Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Area Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Area Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Area Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter Objective ,[object Object]
Chapter Summary ,[object Object],[object Object],[object Object]
[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
4.1.10 Quality Assurance   Verify that system changes are authorized, tested and implemented in a controlled manner prior to being introduced into the production environment. 4.1 Information Systems Operations
4.1.11 Information Security Management •  Performing risk assessments on information assets •  Performing business impact analyses •  Conducting security assessments on a regular basis •  Implementing a formal vulnerability management process 4.1 Information Systems Operations
Chapter 4 Question 1 When reviewing a service level agreement for an outsourced computer center an IS auditor should  FIRST  determine that:   A. the cost proposed for the services is reasonable. B. security mechanisms are specified in the agreement. C. the services in the agreement are based on an analysis of business needs. D. audit access to the computer center is allowed under the agreement.
Which of the following is the  MOST  effective method for an IS auditor to use in testing the program change management process?   A. Trace from system generated information to the change management documentation. B. Examine change management documentation for evidence of accuracy. C. Trace from the change management documentation to a system generated audit trail. D. Examine change management documentation for evidence of completeness. Chapter 4 Question 2
A university’s IT department and financial services office (FSO) have an existing service level agreement that requires availability during each month to exceed 98 percent. FSO has analyzed availability and noted that it has exceeded 98 percent for each of the last 12 months, but has averaged only 93 percent during month-end closing. Which of the following options BEST reflects the course of action FSO should take?   A. Renegotiate the agreement. B. Inform IT that it is not meeting the required availability standard. C. Acquire additional computing resources. D. Streamline the month-end closing process. Chapter 4 Question 3
[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
Which one of the following provides the  BEST  method for determining the level of performance provided by similar information-processing-facility environments?   A. User satisfaction B. Goal accomplishment  C. Benchmarking D. Capacity and growth planning Chapter 4 Question 4
The key objective of capacity planning procedures is to ensure that:    A. available resources are fully utilized.  B. new resources will be added for new applications in a timely manner.  C. available resources are used efficiently and effectively.  D. utilization of resources does not drop below 85%.  Chapter 4 Question 5
4.3 Information Systems Architecture and Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
When conducting an audit of client-server database security, the IS auditor should be  MOST  concerned about the availability of:   A. system utilities. B. application program generators. C. systems security documentation. D. access to stored procedures . Chapter 4 Question 6
The  PRIMARY  benefit of database normalization is the:   A. minimization redundancy of information in tables required to satisfy users’ needs. B. ability to satisfy more queries. C. maximization of database integrity by providing information in more than one table. D. minimization of response time through faster processing of information.  Chapter 4 Question 7
4.4 Information Systems  Network  Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
Chapter 4 Question 8 An IS auditor when reviewing a network used for Internet communications will  FIRST  examine the:   A. validity of password change occurrences. B. architecture of the client-server application. C. network architecture and design. D. firewall protection and proxy servers .
Which of the following would allow a company to extend its enterprise’s intranet across the Internet to its business partners?    A. Virtual private network  B. Client-server C. Dial-up access D. Network service provider Chapter 4 Question 9
Which of the following statements relating to packet switching networks is correct?   A. Packets for a given message travel the same route. B. Passwords cannot be embedded within the packet. C. Packet lengths are variable and each packet contains the same amount of information. D. The cost charged for transmission is based on the packet, not the distance or route traveled.  Chapter 4 Question 10
4.5 Auditing Infrastructure  and Operations ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
4.6 Chapter 4: Case Study ,[object Object],[object Object]
4.6 Chapter 4: Case Study ,[object Object]
4.6.2 Case Study Questions ,[object Object],[object Object],[object Object],[object Object],[object Object]
4.6.2 Case Study Questions ,[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

system analysis and design Chap006
 system analysis and design  Chap006 system analysis and design  Chap006
system analysis and design Chap006Nderitu Muriithi
 
NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)April Mardock CISSP
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life CycleMaurice Dawson
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)Cyril Soeri
 
How to use Correlations to find Insights
How to use Correlations to find InsightsHow to use Correlations to find Insights
How to use Correlations to find InsightsRay Poynter
 
Software Development Life Cycle Model
Software Development Life Cycle ModelSoftware Development Life Cycle Model
Software Development Life Cycle ModelJ.T.A.JONES
 
A Software Architect's View On Diagramming
A Software Architect's View On DiagrammingA Software Architect's View On Diagramming
A Software Architect's View On Diagrammingmeghantaylor
 
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...iFour Consultancy
 
Modelos de Processo de Software Parte 4
Modelos de Processo de Software Parte 4Modelos de Processo de Software Parte 4
Modelos de Processo de Software Parte 4Elaine Cecília Gatto
 
The fbi’s virtual case file
The fbi’s virtual case fileThe fbi’s virtual case file
The fbi’s virtual case fileTeniola Alimi
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTGaffri Johnson
 
The system development life cycle (SDLC)
The system development life cycle (SDLC)The system development life cycle (SDLC)
The system development life cycle (SDLC)gourav kottawar
 
Introduction To Software Configuration Management
Introduction To Software Configuration ManagementIntroduction To Software Configuration Management
Introduction To Software Configuration ManagementRajesh Kumar
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement AnalysisSADEED AMEEN
 
Requirement analysis and specification, software engineering
Requirement analysis and specification, software engineeringRequirement analysis and specification, software engineering
Requirement analysis and specification, software engineeringRupesh Vaishnav
 

Was ist angesagt? (20)

system analysis and design Chap006
 system analysis and design  Chap006 system analysis and design  Chap006
system analysis and design Chap006
 
Mm iso 27001 2013 +annex a
Mm iso 27001 2013 +annex aMm iso 27001 2013 +annex a
Mm iso 27001 2013 +annex a
 
NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)
 
Oracle Database Vault
Oracle Database VaultOracle Database Vault
Oracle Database Vault
 
How to use Correlations to find Insights
How to use Correlations to find InsightsHow to use Correlations to find Insights
How to use Correlations to find Insights
 
Software Development Life Cycle Model
Software Development Life Cycle ModelSoftware Development Life Cycle Model
Software Development Life Cycle Model
 
A Software Architect's View On Diagramming
A Software Architect's View On DiagrammingA Software Architect's View On Diagramming
A Software Architect's View On Diagramming
 
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
 
Modelos de Processo de Software Parte 4
Modelos de Processo de Software Parte 4Modelos de Processo de Software Parte 4
Modelos de Processo de Software Parte 4
 
The fbi’s virtual case file
The fbi’s virtual case fileThe fbi’s virtual case file
The fbi’s virtual case file
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013  ChecklistISO/IEC 27001:2005 naar ISO 27001:2013  Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
 
The system development life cycle (SDLC)
The system development life cycle (SDLC)The system development life cycle (SDLC)
The system development life cycle (SDLC)
 
Introduction To Software Configuration Management
Introduction To Software Configuration ManagementIntroduction To Software Configuration Management
Introduction To Software Configuration Management
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement Analysis
 
Requirement analysis and specification, software engineering
Requirement analysis and specification, software engineeringRequirement analysis and specification, software engineering
Requirement analysis and specification, software engineering
 

Andere mochten auch

CISA exam 100 practice question
CISA exam 100 practice questionCISA exam 100 practice question
CISA exam 100 practice questionArshad A Javed
 
Chap1 2007 Cisa Review Course
Chap1 2007 Cisa Review CourseChap1 2007 Cisa Review Course
Chap1 2007 Cisa Review CourseDesmond Devendran
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseDesmond Devendran
 
Chap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseChap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseDesmond Devendran
 
Chap6 2007 C I S A Review Course
Chap6 2007 C I S A Review CourseChap6 2007 C I S A Review Course
Chap6 2007 C I S A Review CourseDesmond Devendran
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDesmond Devendran
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseDesmond Devendran
 
Information System & IT Audit BML 303 past paper pack 2016
Information System & IT Audit BML 303 past paper pack 2016Information System & IT Audit BML 303 past paper pack 2016
Information System & IT Audit BML 303 past paper pack 2016San King
 
CH004
CH004CH004
CH004JUC
 
CH002
CH002CH002
CH002JUC
 
Disaster recovery: modernized best practices for Oracle's JD Edwards and beyond
Disaster recovery: modernized best practices for Oracle's JD Edwards and beyondDisaster recovery: modernized best practices for Oracle's JD Edwards and beyond
Disaster recovery: modernized best practices for Oracle's JD Edwards and beyondVelocity Technology Solutions
 
CH001
CH001CH001
CH001JUC
 
CH005
CH005CH005
CH005JUC
 

Andere mochten auch (20)

CISA exam 100 practice question
CISA exam 100 practice questionCISA exam 100 practice question
CISA exam 100 practice question
 
Chap1 2007 Cisa Review Course
Chap1 2007 Cisa Review CourseChap1 2007 Cisa Review Course
Chap1 2007 Cisa Review Course
 
CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
Chap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseChap6 2007 Cisa Review Course
Chap6 2007 Cisa Review Course
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
 
CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016
 
CISA Review Course Slides - Part1
CISA Review Course Slides - Part1CISA Review Course Slides - Part1
CISA Review Course Slides - Part1
 
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
 
Chap6 2007 C I S A Review Course
Chap6 2007 C I S A Review CourseChap6 2007 C I S A Review Course
Chap6 2007 C I S A Review Course
 
Ch2 2009 cisa
Ch2 2009 cisaCh2 2009 cisa
Ch2 2009 cisa
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 
Information System & IT Audit BML 303 past paper pack 2016
Information System & IT Audit BML 303 past paper pack 2016Information System & IT Audit BML 303 past paper pack 2016
Information System & IT Audit BML 303 past paper pack 2016
 
Bcp
BcpBcp
Bcp
 
CH004
CH004CH004
CH004
 
CH002
CH002CH002
CH002
 
Disaster recovery: modernized best practices for Oracle's JD Edwards and beyond
Disaster recovery: modernized best practices for Oracle's JD Edwards and beyondDisaster recovery: modernized best practices for Oracle's JD Edwards and beyond
Disaster recovery: modernized best practices for Oracle's JD Edwards and beyond
 
CH001
CH001CH001
CH001
 
CH005
CH005CH005
CH005
 

Ähnlich wie des

Online-Voting-System.doc
Online-Voting-System.docOnline-Voting-System.doc
Online-Voting-System.docShangaviS2
 
age 1Question 1.1. (TCO 1) An important aspect of a network mana.docx
age 1Question 1.1. (TCO 1) An important aspect of a network mana.docxage 1Question 1.1. (TCO 1) An important aspect of a network mana.docx
age 1Question 1.1. (TCO 1) An important aspect of a network mana.docxgalerussel59292
 
Library management system
Library management systemLibrary management system
Library management systemArman Ahmed
 
Dynamic datacenter planning and design
Dynamic datacenter   planning and designDynamic datacenter   planning and design
Dynamic datacenter planning and designYeonki Choi
 
computer system validation
computer system validationcomputer system validation
computer system validationGopal Patel
 
NetIQ approach to ITIL
NetIQ approach to ITILNetIQ approach to ITIL
NetIQ approach to ITILmbmobile
 
10135 a 11
10135 a 1110135 a 11
10135 a 11Bố Su
 
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxMEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxARIV4
 
1 Information Systems Analysis & Design,.pptx
1 Information Systems Analysis & Design,.pptx1 Information Systems Analysis & Design,.pptx
1 Information Systems Analysis & Design,.pptxMadhusudhanaSubraman
 
T3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of ExcellenceT3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of Excellenceveehikle
 
SoftwareRequirements (1).doc
SoftwareRequirements (1).docSoftwareRequirements (1).doc
SoftwareRequirements (1).docMadihaKhalid43
 
Perfexpert
PerfexpertPerfexpert
Perfexpertgystell
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformancePrecisely
 

Ähnlich wie des (20)

Online-Voting-System.doc
Online-Voting-System.docOnline-Voting-System.doc
Online-Voting-System.doc
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 
age 1Question 1.1. (TCO 1) An important aspect of a network mana.docx
age 1Question 1.1. (TCO 1) An important aspect of a network mana.docxage 1Question 1.1. (TCO 1) An important aspect of a network mana.docx
age 1Question 1.1. (TCO 1) An important aspect of a network mana.docx
 
Information system
Information systemInformation system
Information system
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
Bilal Arshad 27031...pdf
Bilal Arshad 27031...pdfBilal Arshad 27031...pdf
Bilal Arshad 27031...pdf
 
Library management system
Library management systemLibrary management system
Library management system
 
Dynamic datacenter planning and design
Dynamic datacenter   planning and designDynamic datacenter   planning and design
Dynamic datacenter planning and design
 
QCM_TSHOOT.pdf
QCM_TSHOOT.pdfQCM_TSHOOT.pdf
QCM_TSHOOT.pdf
 
computer system validation
computer system validationcomputer system validation
computer system validation
 
NetIQ approach to ITIL
NetIQ approach to ITILNetIQ approach to ITIL
NetIQ approach to ITIL
 
10135 a 11
10135 a 1110135 a 11
10135 a 11
 
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxMEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
 
A075434624
A075434624A075434624
A075434624
 
1 Information Systems Analysis & Design,.pptx
1 Information Systems Analysis & Design,.pptx1 Information Systems Analysis & Design,.pptx
1 Information Systems Analysis & Design,.pptx
 
T3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of ExcellenceT3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of Excellence
 
SoftwareRequirements (1).doc
SoftwareRequirements (1).docSoftwareRequirements (1).doc
SoftwareRequirements (1).doc
 
Perfexpert
PerfexpertPerfexpert
Perfexpert
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
 

Mehr von Desmond Devendran (20)

Siam key-facts
Siam key-factsSiam key-facts
Siam key-facts
 
Siam foundation-process-guides
Siam foundation-process-guidesSiam foundation-process-guides
Siam foundation-process-guides
 
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledgeSiam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
 
Enterprise service-management-essentials
Enterprise service-management-essentialsEnterprise service-management-essentials
Enterprise service-management-essentials
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
CHFI 1
CHFI 1CHFI 1
CHFI 1
 
File000176
File000176File000176
File000176
 
File000175
File000175File000175
File000175
 
File000174
File000174File000174
File000174
 
File000173
File000173File000173
File000173
 
File000172
File000172File000172
File000172
 
File000171
File000171File000171
File000171
 
File000170
File000170File000170
File000170
 
File000169
File000169File000169
File000169
 
File000168
File000168File000168
File000168
 
File000167
File000167File000167
File000167
 
File000166
File000166File000166
File000166
 
File000165
File000165File000165
File000165
 
File000164
File000164File000164
File000164
 
File000163
File000163File000163
File000163
 

des

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. 4.1.10 Quality Assurance Verify that system changes are authorized, tested and implemented in a controlled manner prior to being introduced into the production environment. 4.1 Information Systems Operations
  • 25. 4.1.11 Information Security Management • Performing risk assessments on information assets • Performing business impact analyses • Conducting security assessments on a regular basis • Implementing a formal vulnerability management process 4.1 Information Systems Operations
  • 26. Chapter 4 Question 1 When reviewing a service level agreement for an outsourced computer center an IS auditor should FIRST determine that:   A. the cost proposed for the services is reasonable. B. security mechanisms are specified in the agreement. C. the services in the agreement are based on an analysis of business needs. D. audit access to the computer center is allowed under the agreement.
  • 27. Which of the following is the MOST effective method for an IS auditor to use in testing the program change management process?   A. Trace from system generated information to the change management documentation. B. Examine change management documentation for evidence of accuracy. C. Trace from the change management documentation to a system generated audit trail. D. Examine change management documentation for evidence of completeness. Chapter 4 Question 2
  • 28. A university’s IT department and financial services office (FSO) have an existing service level agreement that requires availability during each month to exceed 98 percent. FSO has analyzed availability and noted that it has exceeded 98 percent for each of the last 12 months, but has averaged only 93 percent during month-end closing. Which of the following options BEST reflects the course of action FSO should take?   A. Renegotiate the agreement. B. Inform IT that it is not meeting the required availability standard. C. Acquire additional computing resources. D. Streamline the month-end closing process. Chapter 4 Question 3
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. Which one of the following provides the BEST method for determining the level of performance provided by similar information-processing-facility environments?   A. User satisfaction B. Goal accomplishment C. Benchmarking D. Capacity and growth planning Chapter 4 Question 4
  • 41. The key objective of capacity planning procedures is to ensure that:   A. available resources are fully utilized. B. new resources will be added for new applications in a timely manner. C. available resources are used efficiently and effectively. D. utilization of resources does not drop below 85%. Chapter 4 Question 5
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59. When conducting an audit of client-server database security, the IS auditor should be MOST concerned about the availability of:   A. system utilities. B. application program generators. C. systems security documentation. D. access to stored procedures . Chapter 4 Question 6
  • 60. The PRIMARY benefit of database normalization is the:   A. minimization redundancy of information in tables required to satisfy users’ needs. B. ability to satisfy more queries. C. maximization of database integrity by providing information in more than one table. D. minimization of response time through faster processing of information. Chapter 4 Question 7
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82. Chapter 4 Question 8 An IS auditor when reviewing a network used for Internet communications will FIRST examine the:   A. validity of password change occurrences. B. architecture of the client-server application. C. network architecture and design. D. firewall protection and proxy servers .
  • 83. Which of the following would allow a company to extend its enterprise’s intranet across the Internet to its business partners?   A. Virtual private network B. Client-server C. Dial-up access D. Network service provider Chapter 4 Question 9
  • 84. Which of the following statements relating to packet switching networks is correct?   A. Packets for a given message travel the same route. B. Passwords cannot be embedded within the packet. C. Packet lengths are variable and each packet contains the same amount of information. D. The cost charged for transmission is based on the packet, not the distance or route traveled. Chapter 4 Question 10
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.

Hinweis der Redaktion

  1. This presentation is for the purpose of describing the details of the CISA certification program to candidates participating in an ISACA chapter sponsored CISA Review Course.