1. During an IS audit of a data center, it was found that programmers are allowed to make emergency fixes to operational programs. Which of the following should be the IS auditor's PRIMARY recommendation?
A) Bypass use ID procedures should be put in place to ensure that the changes are subject to after-the-event approval and testing B) The ability to undertake emergency fixes should be restricted to selected key personnel C) Programmers should be allowed to implement emergency fixes only after obtaining verbal agreement from the application owner D) Emergency program changes should be subject to program migration and testing procedures before they are applied to operational systems
2. An IS auditor observes that routine backups of operational databases are taking longer than before. Which of the following would MOST effectively help to reduce backup and recovery times for operational databases?
A) Utilizing database technologies to achieve efficiencies B) Using solid storage device (SSD) media C) Requiring a combination of weekly full backups and daily differential backups D) Archiving historical data in accordance with the data retention policy
3. Which of the following is the GREATEST concern associated with control self-assessments?
A) Employees may have insufficient awareness of controls B) Controls may not be assessed objectively C) Communication between operational management and senior management may not be effective D) The assessment may not provide sufficient assurance to stakeholders
4. The BEST test to determine whether an application's internal security controls are configured in compliance with the organization's security standards is an evaluation of the:
A) availability and frequency of security reports B) intrusion detection system (IDS) logs C) application's user accounts and passwords D) business application's security parameter settings
5. Which of the following could provide an organization with the fastest resumption of processing following a disk failure?
A) Server load balancing B) Mirroring C) Open database connectivity (ODBC) of the backup server D) Replication
Leave a comment