Activity2
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
muhammad usman
Used 1+ times
FREE Resource
Enhance your content in a minute
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a risk based audit where both inherent and control risks have been assessed as high, and IS auditor will most likely perform:
Substantive Testing
Compliance Testing
Discovery Sampling
Stop-or-Go Sampling
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
An IS Auditor notes unapproved IT policies, but notes employees strictly following these policies. The IS auditor should:
Ignore it because employees follow policies strictly
Recommend immediate approval of policies
Emphasize the approval of policies to management
Report the absence of documented approval of policies
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following is the best reason for placing conditions on secondary employment of IT employees:
to prevent misuse of corporate resources
to prevent conflict of interest
to prevent employee performance issues
to prevent theft of IT assets and information of the company
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
While reviewing information security policy, which of the following is of the BIGGEST concern for the IS Auditor:
The policy has not been updated in more than one year
The policy includes no revision history
Policy is approved by security administrator
No information security policy committee was formed to draft the policy
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
An IS Auditor is reviewing the software development methodology of an organization that has adopted Agile methodology. IS Auditor will be MOST concerned with:
Certain Iterations producing unfinished code
Not extensive documentation
Continuous preplanning of the project
Managers do not mange project resources, delegating these to team members
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Two factor authentication can be circumvented through which of the following attacks:
Denial of Service
Man-in-the-Middle
Brute force
keylogging
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following anti-spam filtering methods has the lowest possibility of false positive alerts?
Rule based
check sum based
heuristic filtering
Statistic based
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
Computer Networking Fundamentals
Quiz
•
Professional Development
11 questions
DECI - M3 - W4 - Round2
Quiz
•
Professional Development
10 questions
python quiz
Quiz
•
6th Grade - Professio...
19 questions
SC-900_Módulo 4
Quiz
•
Professional Development
10 questions
Scratch
Quiz
•
KG - Professional Dev...
16 questions
E-Commerce
Quiz
•
University - Professi...
20 questions
Installing and Configuring Computer Systems 2
Quiz
•
Professional Development
10 questions
USE OF ICT IN THE LEARNING PROCESS
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Computers
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development
