SlideShare una empresa de Scribd logo
1 de 101
2007 CISA   Review Course ,[object Object],[object Object]
Process Area Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Area Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Area Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Area Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter Objective ,[object Object]
Chapter Summary ,[object Object],[object Object],[object Object]
[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],4.1 Information Systems Operations
[object Object],[object Object],[object Object],[object Object],4.1 Information Systems Operations
4.1.10 Quality Assurance   Verify that system changes are authorized, tested and implemented in a controlled manner prior to being introduced into the production environment. 4.1 Information Systems Operations
4.1.11 Information Security Management •  Performing risk assessments on information assets •  Performing business impact analyses •  Conducting security assessments on a regular basis •  Implementing a formal vulnerability management process 4.1 Information Systems Operations
Chapter 4 Question 1 When reviewing a service level agreement for an outsourced computer center an IS auditor should  FIRST  determine that:   A. the cost proposed for the services is reasonable. B. security mechanisms are specified in the agreement. C. the services in the agreement are based on an analysis of business needs. D. audit access to the computer center is allowed under the agreement.
Which of the following is the  MOST  effective method for an IS auditor to use in testing the program change management process?   A. Trace from system generated information to the change management documentation. B. Examine change management documentation for evidence of accuracy. C. Trace from the change management documentation to a system generated audit trail. D. Examine change management documentation for evidence of completeness. Chapter 4 Question 2
A university’s IT department and financial services office (FSO) have an existing service level agreement that requires availability during each month to exceed 98 percent. FSO has analyzed availability and noted that it has exceeded 98 percent for each of the last 12 months, but has averaged only 93 percent during month-end closing. Which of the following options BEST reflects the course of action FSO should take?   A. Renegotiate the agreement. B. Inform IT that it is not meeting the required availability standard. C. Acquire additional computing resources. D. Streamline the month-end closing process. Chapter 4 Question 3
[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.2 Information Systems Hardware
Which one of the following provides the  BEST  method for determining the level of performance provided by similar information-processing-facility environments?   A. User satisfaction B. Goal accomplishment  C. Benchmarking D. Capacity and growth planning Chapter 4 Question 4
The key objective of capacity planning procedures is to ensure that:    A. available resources are fully utilized.  B. new resources will be added for new applications in a timely manner.  C. available resources are used efficiently and effectively.  D. utilization of resources does not drop below 85%.  Chapter 4 Question 5
4.3 Information Systems Architecture and Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.3 Information Systems Architecture and Software
When conducting an audit of client-server database security, the IS auditor should be  MOST  concerned about the availability of:   A. system utilities. B. application program generators. C. systems security documentation. D. access to stored procedures . Chapter 4 Question 6
The  PRIMARY  benefit of database normalization is the:   A. minimization redundancy of information in tables required to satisfy users’ needs. B. ability to satisfy more queries. C. maximization of database integrity by providing information in more than one table. D. minimization of response time through faster processing of information.  Chapter 4 Question 7
4.4 Information Systems  Network  Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
[object Object],[object Object],[object Object],4.4 Information Systems  Network  Infrastructure
Chapter 4 Question 8 An IS auditor when reviewing a network used for Internet communications will  FIRST  examine the:   A. validity of password change occurrences. B. architecture of the client-server application. C. network architecture and design. D. firewall protection and proxy servers .
Which of the following would allow a company to extend its enterprise’s intranet across the Internet to its business partners?    A. Virtual private network  B. Client-server C. Dial-up access D. Network service provider Chapter 4 Question 9
Which of the following statements relating to packet switching networks is correct?   A. Packets for a given message travel the same route. B. Passwords cannot be embedded within the packet. C. Packet lengths are variable and each packet contains the same amount of information. D. The cost charged for transmission is based on the packet, not the distance or route traveled.  Chapter 4 Question 10
4.5 Auditing Infrastructure  and Operations ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4.5 Auditing Infrastructure  and Operations
4.6 Chapter 4: Case Study ,[object Object],[object Object]
4.6 Chapter 4: Case Study ,[object Object]
4.6.2 Case Study Questions ,[object Object],[object Object],[object Object],[object Object],[object Object]
4.6.2 Case Study Questions ,[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

2009 1 - sistemas operacionais - aula 7 - deadlocks
2009 1 - sistemas operacionais - aula 7 - deadlocks2009 1 - sistemas operacionais - aula 7 - deadlocks
2009 1 - sistemas operacionais - aula 7 - deadlocksComputação Depressão
 
SQA - chapter 13 (Software Quality Infrastructure)
SQA - chapter 13 (Software Quality Infrastructure)SQA - chapter 13 (Software Quality Infrastructure)
SQA - chapter 13 (Software Quality Infrastructure)uma sree
 
2.software requirement specification
2.software requirement specification2.software requirement specification
2.software requirement specificationDeepak Sharma
 
Analysis of Database Issues using AHF and Machine Learning v2 - SOUG
Analysis of Database Issues using AHF and Machine Learning v2 -  SOUGAnalysis of Database Issues using AHF and Machine Learning v2 -  SOUG
Analysis of Database Issues using AHF and Machine Learning v2 - SOUGSandesh Rao
 
Function Point Analysis: An Overview
Function Point Analysis: An OverviewFunction Point Analysis: An Overview
Function Point Analysis: An OverviewDCG Software Value
 
Ch 1-Non-functional Requirements.ppt
Ch 1-Non-functional Requirements.pptCh 1-Non-functional Requirements.ppt
Ch 1-Non-functional Requirements.pptbalewayalew
 
Penanganan Insiden Forensik
Penanganan Insiden ForensikPenanganan Insiden Forensik
Penanganan Insiden ForensikYanizar R
 
Analisis dan desain sistem informasi
Analisis dan desain sistem informasiAnalisis dan desain sistem informasi
Analisis dan desain sistem informasiNurdin Al-Azies
 
System Design and Analysis 1
System Design and Analysis 1System Design and Analysis 1
System Design and Analysis 1Boeun Tim
 
Concepts of cutover planning and management
Concepts of cutover planning and managementConcepts of cutover planning and management
Concepts of cutover planning and managementSanjay Choubey
 
Resume software measurement
Resume software measurementResume software measurement
Resume software measurementErwan Nur Arief
 
Chapter03 managing the information systems project
Chapter03 managing the information systems projectChapter03 managing the information systems project
Chapter03 managing the information systems projectDhani Ahmad
 
eCIO PPT Roles for a SAP and Systems Integration Project
eCIO PPT Roles for a SAP and Systems Integration ProjecteCIO PPT Roles for a SAP and Systems Integration Project
eCIO PPT Roles for a SAP and Systems Integration ProjectDavid Niles
 
Entendendo o ZDLRA - Oracle Zero Data Loss Recovery Appliance e garantindo rp...
Entendendo o ZDLRA - Oracle Zero Data Loss Recovery Appliance e garantindo rp...Entendendo o ZDLRA - Oracle Zero Data Loss Recovery Appliance e garantindo rp...
Entendendo o ZDLRA - Oracle Zero Data Loss Recovery Appliance e garantindo rp...Weligton Pinto
 

La actualidad más candente (20)

System analysis
System analysisSystem analysis
System analysis
 
2009 1 - sistemas operacionais - aula 7 - deadlocks
2009 1 - sistemas operacionais - aula 7 - deadlocks2009 1 - sistemas operacionais - aula 7 - deadlocks
2009 1 - sistemas operacionais - aula 7 - deadlocks
 
SQA - chapter 13 (Software Quality Infrastructure)
SQA - chapter 13 (Software Quality Infrastructure)SQA - chapter 13 (Software Quality Infrastructure)
SQA - chapter 13 (Software Quality Infrastructure)
 
2.software requirement specification
2.software requirement specification2.software requirement specification
2.software requirement specification
 
Analysis of Database Issues using AHF and Machine Learning v2 - SOUG
Analysis of Database Issues using AHF and Machine Learning v2 -  SOUGAnalysis of Database Issues using AHF and Machine Learning v2 -  SOUG
Analysis of Database Issues using AHF and Machine Learning v2 - SOUG
 
Software metrics
Software metricsSoftware metrics
Software metrics
 
Function Point Analysis: An Overview
Function Point Analysis: An OverviewFunction Point Analysis: An Overview
Function Point Analysis: An Overview
 
Ch 1-Non-functional Requirements.ppt
Ch 1-Non-functional Requirements.pptCh 1-Non-functional Requirements.ppt
Ch 1-Non-functional Requirements.ppt
 
Penanganan Insiden Forensik
Penanganan Insiden ForensikPenanganan Insiden Forensik
Penanganan Insiden Forensik
 
Analisis dan desain sistem informasi
Analisis dan desain sistem informasiAnalisis dan desain sistem informasi
Analisis dan desain sistem informasi
 
Spm unit1
Spm unit1Spm unit1
Spm unit1
 
System Design and Analysis 1
System Design and Analysis 1System Design and Analysis 1
System Design and Analysis 1
 
Concepts of cutover planning and management
Concepts of cutover planning and managementConcepts of cutover planning and management
Concepts of cutover planning and management
 
Resume software measurement
Resume software measurementResume software measurement
Resume software measurement
 
Scampi
ScampiScampi
Scampi
 
Rekayasa perangkat lunak
Rekayasa perangkat lunakRekayasa perangkat lunak
Rekayasa perangkat lunak
 
Chapter03 managing the information systems project
Chapter03 managing the information systems projectChapter03 managing the information systems project
Chapter03 managing the information systems project
 
eCIO PPT Roles for a SAP and Systems Integration Project
eCIO PPT Roles for a SAP and Systems Integration ProjecteCIO PPT Roles for a SAP and Systems Integration Project
eCIO PPT Roles for a SAP and Systems Integration Project
 
Entendendo o ZDLRA - Oracle Zero Data Loss Recovery Appliance e garantindo rp...
Entendendo o ZDLRA - Oracle Zero Data Loss Recovery Appliance e garantindo rp...Entendendo o ZDLRA - Oracle Zero Data Loss Recovery Appliance e garantindo rp...
Entendendo o ZDLRA - Oracle Zero Data Loss Recovery Appliance e garantindo rp...
 
system development life cycle
system development life cyclesystem development life cycle
system development life cycle
 

Destacado

CISA exam 100 practice question
CISA exam 100 practice questionCISA exam 100 practice question
CISA exam 100 practice questionArshad A Javed
 
Chap1 2007 Cisa Review Course
Chap1 2007 Cisa Review CourseChap1 2007 Cisa Review Course
Chap1 2007 Cisa Review CourseDesmond Devendran
 
Chap3 2007 Cisa Review Course
Chap3 2007 Cisa Review CourseChap3 2007 Cisa Review Course
Chap3 2007 Cisa Review CourseDesmond Devendran
 
Chap5 2007 Cisa Review Course
Chap5 2007 Cisa Review CourseChap5 2007 Cisa Review Course
Chap5 2007 Cisa Review CourseDesmond Devendran
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseDesmond Devendran
 
Chap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseChap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseDesmond Devendran
 
Chap6 2007 C I S A Review Course
Chap6 2007 C I S A Review CourseChap6 2007 C I S A Review Course
Chap6 2007 C I S A Review CourseDesmond Devendran
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDesmond Devendran
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseDesmond Devendran
 
Information System & IT Audit BML 303 past paper pack 2016
Information System & IT Audit BML 303 past paper pack 2016Information System & IT Audit BML 303 past paper pack 2016
Information System & IT Audit BML 303 past paper pack 2016San King
 
CH004
CH004CH004
CH004JUC
 
CH002
CH002CH002
CH002JUC
 
Disaster recovery: modernized best practices for Oracle's JD Edwards and beyond
Disaster recovery: modernized best practices for Oracle's JD Edwards and beyondDisaster recovery: modernized best practices for Oracle's JD Edwards and beyond
Disaster recovery: modernized best practices for Oracle's JD Edwards and beyondVelocity Technology Solutions
 

Destacado (20)

CISA exam 100 practice question
CISA exam 100 practice questionCISA exam 100 practice question
CISA exam 100 practice question
 
Chap1 2007 Cisa Review Course
Chap1 2007 Cisa Review CourseChap1 2007 Cisa Review Course
Chap1 2007 Cisa Review Course
 
CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016
 
Chap3 2007 Cisa Review Course
Chap3 2007 Cisa Review CourseChap3 2007 Cisa Review Course
Chap3 2007 Cisa Review Course
 
Chap5 2007 Cisa Review Course
Chap5 2007 Cisa Review CourseChap5 2007 Cisa Review Course
Chap5 2007 Cisa Review Course
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
Chap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseChap6 2007 Cisa Review Course
Chap6 2007 Cisa Review Course
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
 
CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016
 
CISA Review Course Slides - Part1
CISA Review Course Slides - Part1CISA Review Course Slides - Part1
CISA Review Course Slides - Part1
 
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
 
Chap6 2007 C I S A Review Course
Chap6 2007 C I S A Review CourseChap6 2007 C I S A Review Course
Chap6 2007 C I S A Review Course
 
Ch2 2009 cisa
Ch2 2009 cisaCh2 2009 cisa
Ch2 2009 cisa
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 
Information System & IT Audit BML 303 past paper pack 2016
Information System & IT Audit BML 303 past paper pack 2016Information System & IT Audit BML 303 past paper pack 2016
Information System & IT Audit BML 303 past paper pack 2016
 
Bcp
BcpBcp
Bcp
 
CH004
CH004CH004
CH004
 
CH002
CH002CH002
CH002
 
Disaster recovery: modernized best practices for Oracle's JD Edwards and beyond
Disaster recovery: modernized best practices for Oracle's JD Edwards and beyondDisaster recovery: modernized best practices for Oracle's JD Edwards and beyond
Disaster recovery: modernized best practices for Oracle's JD Edwards and beyond
 

Similar a des

Online-Voting-System.doc
Online-Voting-System.docOnline-Voting-System.doc
Online-Voting-System.docShangaviS2
 
age 1Question 1.1. (TCO 1) An important aspect of a network mana.docx
age 1Question 1.1. (TCO 1) An important aspect of a network mana.docxage 1Question 1.1. (TCO 1) An important aspect of a network mana.docx
age 1Question 1.1. (TCO 1) An important aspect of a network mana.docxgalerussel59292
 
Library management system
Library management systemLibrary management system
Library management systemArman Ahmed
 
Dynamic datacenter planning and design
Dynamic datacenter   planning and designDynamic datacenter   planning and design
Dynamic datacenter planning and designYeonki Choi
 
computer system validation
computer system validationcomputer system validation
computer system validationGopal Patel
 
NetIQ approach to ITIL
NetIQ approach to ITILNetIQ approach to ITIL
NetIQ approach to ITILmbmobile
 
10135 a 11
10135 a 1110135 a 11
10135 a 11Bố Su
 
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxMEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxARIV4
 
1 Information Systems Analysis & Design,.pptx
1 Information Systems Analysis & Design,.pptx1 Information Systems Analysis & Design,.pptx
1 Information Systems Analysis & Design,.pptxMadhusudhanaSubraman
 
T3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of ExcellenceT3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of Excellenceveehikle
 
SoftwareRequirements (1).doc
SoftwareRequirements (1).docSoftwareRequirements (1).doc
SoftwareRequirements (1).docMadihaKhalid43
 
Perfexpert
PerfexpertPerfexpert
Perfexpertgystell
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformancePrecisely
 

Similar a des (20)

Online-Voting-System.doc
Online-Voting-System.docOnline-Voting-System.doc
Online-Voting-System.doc
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 
age 1Question 1.1. (TCO 1) An important aspect of a network mana.docx
age 1Question 1.1. (TCO 1) An important aspect of a network mana.docxage 1Question 1.1. (TCO 1) An important aspect of a network mana.docx
age 1Question 1.1. (TCO 1) An important aspect of a network mana.docx
 
Information system
Information systemInformation system
Information system
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
Bilal Arshad 27031...pdf
Bilal Arshad 27031...pdfBilal Arshad 27031...pdf
Bilal Arshad 27031...pdf
 
Library management system
Library management systemLibrary management system
Library management system
 
Dynamic datacenter planning and design
Dynamic datacenter   planning and designDynamic datacenter   planning and design
Dynamic datacenter planning and design
 
QCM_TSHOOT.pdf
QCM_TSHOOT.pdfQCM_TSHOOT.pdf
QCM_TSHOOT.pdf
 
computer system validation
computer system validationcomputer system validation
computer system validation
 
NetIQ approach to ITIL
NetIQ approach to ITILNetIQ approach to ITIL
NetIQ approach to ITIL
 
10135 a 11
10135 a 1110135 a 11
10135 a 11
 
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxMEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
 
A075434624
A075434624A075434624
A075434624
 
1 Information Systems Analysis & Design,.pptx
1 Information Systems Analysis & Design,.pptx1 Information Systems Analysis & Design,.pptx
1 Information Systems Analysis & Design,.pptx
 
T3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of ExcellenceT3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of Excellence
 
SoftwareRequirements (1).doc
SoftwareRequirements (1).docSoftwareRequirements (1).doc
SoftwareRequirements (1).doc
 
Perfexpert
PerfexpertPerfexpert
Perfexpert
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
 

Más de Desmond Devendran (20)

Siam key-facts
Siam key-factsSiam key-facts
Siam key-facts
 
Siam foundation-process-guides
Siam foundation-process-guidesSiam foundation-process-guides
Siam foundation-process-guides
 
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledgeSiam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
 
Enterprise service-management-essentials
Enterprise service-management-essentialsEnterprise service-management-essentials
Enterprise service-management-essentials
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
CHFI 1
CHFI 1CHFI 1
CHFI 1
 
File000176
File000176File000176
File000176
 
File000175
File000175File000175
File000175
 
File000174
File000174File000174
File000174
 
File000173
File000173File000173
File000173
 
File000172
File000172File000172
File000172
 
File000171
File000171File000171
File000171
 
File000170
File000170File000170
File000170
 
File000169
File000169File000169
File000169
 
File000168
File000168File000168
File000168
 
File000167
File000167File000167
File000167
 
File000166
File000166File000166
File000166
 
File000165
File000165File000165
File000165
 
File000164
File000164File000164
File000164
 
File000163
File000163File000163
File000163
 

des

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. 4.1.10 Quality Assurance Verify that system changes are authorized, tested and implemented in a controlled manner prior to being introduced into the production environment. 4.1 Information Systems Operations
  • 25. 4.1.11 Information Security Management • Performing risk assessments on information assets • Performing business impact analyses • Conducting security assessments on a regular basis • Implementing a formal vulnerability management process 4.1 Information Systems Operations
  • 26. Chapter 4 Question 1 When reviewing a service level agreement for an outsourced computer center an IS auditor should FIRST determine that:   A. the cost proposed for the services is reasonable. B. security mechanisms are specified in the agreement. C. the services in the agreement are based on an analysis of business needs. D. audit access to the computer center is allowed under the agreement.
  • 27. Which of the following is the MOST effective method for an IS auditor to use in testing the program change management process?   A. Trace from system generated information to the change management documentation. B. Examine change management documentation for evidence of accuracy. C. Trace from the change management documentation to a system generated audit trail. D. Examine change management documentation for evidence of completeness. Chapter 4 Question 2
  • 28. A university’s IT department and financial services office (FSO) have an existing service level agreement that requires availability during each month to exceed 98 percent. FSO has analyzed availability and noted that it has exceeded 98 percent for each of the last 12 months, but has averaged only 93 percent during month-end closing. Which of the following options BEST reflects the course of action FSO should take?   A. Renegotiate the agreement. B. Inform IT that it is not meeting the required availability standard. C. Acquire additional computing resources. D. Streamline the month-end closing process. Chapter 4 Question 3
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. Which one of the following provides the BEST method for determining the level of performance provided by similar information-processing-facility environments?   A. User satisfaction B. Goal accomplishment C. Benchmarking D. Capacity and growth planning Chapter 4 Question 4
  • 41. The key objective of capacity planning procedures is to ensure that:   A. available resources are fully utilized. B. new resources will be added for new applications in a timely manner. C. available resources are used efficiently and effectively. D. utilization of resources does not drop below 85%. Chapter 4 Question 5
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59. When conducting an audit of client-server database security, the IS auditor should be MOST concerned about the availability of:   A. system utilities. B. application program generators. C. systems security documentation. D. access to stored procedures . Chapter 4 Question 6
  • 60. The PRIMARY benefit of database normalization is the:   A. minimization redundancy of information in tables required to satisfy users’ needs. B. ability to satisfy more queries. C. maximization of database integrity by providing information in more than one table. D. minimization of response time through faster processing of information. Chapter 4 Question 7
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82. Chapter 4 Question 8 An IS auditor when reviewing a network used for Internet communications will FIRST examine the:   A. validity of password change occurrences. B. architecture of the client-server application. C. network architecture and design. D. firewall protection and proxy servers .
  • 83. Which of the following would allow a company to extend its enterprise’s intranet across the Internet to its business partners?   A. Virtual private network B. Client-server C. Dial-up access D. Network service provider Chapter 4 Question 9
  • 84. Which of the following statements relating to packet switching networks is correct?   A. Packets for a given message travel the same route. B. Passwords cannot be embedded within the packet. C. Packet lengths are variable and each packet contains the same amount of information. D. The cost charged for transmission is based on the packet, not the distance or route traveled. Chapter 4 Question 10
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.

Notas del editor

  1. This presentation is for the purpose of describing the details of the CISA certification program to candidates participating in an ISACA chapter sponsored CISA Review Course.