Published - Fri, 03 Mar 2023

CISA—Certified Information Systems Auditor - Part 123

CISA—Certified Information Systems Auditor - Part 123

1. Who is primarily responsible for storing and safeguarding the data?

A) Data Owner
B) Data User
C) Data Steward
D) Security Administrator



2. Who is responsible for providing adequate physical and logical security for IS program, data and equipment?

A) Data Owner
B) Data User
C) Data Custodian
D) Security Administrator



3. Who is responsible for restricting and monitoring access of a data user?

A) Data Owner
B) Data User
C) Data Custodian
D) Security Administrator



4. Who is responsible for authorizing access level of a data user?

A) Data Owner
B) Data User
C) Data Custodian
D) Security Administrator



5. During Involuntary termination of an employee, which of the following is the MOST important step to be considered?

A) Get a written NDA agreement from an employee
B) Terminate all physical and logical access
C) Provide compensation in lieu of notice period
D) Do not communicate to the respective employee about the termination



1. Right Answer: C
Explanation: Data Steward or data custodian is responsible for storing and safeguarding the data, and include IS personnel such as system analyst and computer operators.For CISA exam you should know below roles in an organizationData Owners '' These peoples are generally managers and directors responsible for using information for running and controlling the business. Their security responsibilities include authorizing access, ensuring that access rules are updated when personnel changes occur, and regularly review access rule for the data for which they are responsible.Data Custodian or Data Steward '' These people are responsible for storing and safeguarding the data, and include IS personnel such as system analysis and computer operators.Security Administrator -Security administrator is responsible for providing adequate physical and logical security for IS programs, data and equipment.Data Users '' Data users, including internal and external user community, are the actual user of computerized data. Their level of access into the computer should be authorized by data owners, and restricted and monitor by security administrator.The following were incorrect answers:Data Owner- These peoples are generally managers and directors responsible for using information for running and controlling the business.Data Users '' Data users, including internal and external user community, are the actual user of computerized data.Security Administrator - Security administrator is responsible for providing adequate and logical security for IS programs, data and equipment.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number361

2. Right Answer: D
Explanation: Security administrator are responsible for providing adequate physical and logical security for IS programs, data and equipment.For CISA exam you should know below roles in an organizationData Owners '' These peoples are generally managers and directors responsible for using information for running and controlling the business. Their security responsibilities include authorizing access, ensuring that access rules are updated when personnel changes occur, and regularly review access rule for the data for which they are responsible.Data Custodian or Data Steward '' These people are responsible for storing and safeguarding the data, and include IS personnel such as system analysis and computer operators.Security Administrator -Security administrator is responsible for providing adequate physical and logical security for IS programs, data and equipment.Data Users '' Data users, including internal and external user community, are the actual user of computerized data. Their level of access into the computer should be authorized by data owners, and restricted and monitor by security administrator.The following were incorrect answers:Data Owner- These peoples are generally managers and directors responsible for using information for running and controlling the business.Data Users '' Data users, including internal and external user community, are the actual user of computerized data.Data custodian is responsible for storing and safeguarding the data, and include IS personnel such as system analyst and computer operators.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 361

3. Right Answer: D
Explanation: Security administrator are responsible for providing adequate and logical security for IS programs, data and equipment.For CISA exam you should know below roles in an organizationData Owners '' These peoples are generally managers and directors responsible for using information for running and controlling the business. Their security responsibilities include authorizing access, ensuring that access rules are updated when personnel changes occur, and regularly review access rule for the data for which they are responsible.Data Custodian or Data Steward '' These people are responsible for storing and safeguarding the data, and include IS personnel such as system analysis and computer operators.Security Administrator-Security administrator are responsible for providing adequate physical and logical security for IS programs, data and equipment.Data Users '' Data users, including internal and external user community, are the actual user of computerized data. Their level of access into the computer should be authorized by data owners, and restricted and monitor by security administrator.The following were incorrect answers:Data Owner - These peoples are generally managers and directors responsible for using information for running and controlling the business.Data Users '' Data users, including internal and external user community, are the actual user of computerized data.Data custodian is responsible for storing and safeguarding the data, and include IS personnel such as system analyst and computer operators.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 361

4. Right Answer: A
Explanation: Data owners are responsible for authorizing access level of a data user. These peoples are generally managers and directors responsible for using information for running and controlling the business. Their security responsibilities include authorizing access, ensuring that access rules are updated when personnel changes occur, and regularly review access rule for the data for which they are responsible.For your exam you should know below roles in an organizationData Owners '' Data Owners are generally managers and directors responsible for using information for running and controlling the business. Their security responsibilities include authorizing access, ensuring that access rules are updated when personnel changes occur, and regularly review access rule for the data for which they are responsible.Data Custodian or Data Steward ''are responsible for storing and safeguarding the data, and include IS personnel such as system analysis and computer operators.Security Administrator -Security administrator is responsible for providing adequate physical and logical security for IS programs, data and equipment.Data Users '' Data users, including internal and external user community, are the actual user of computerized data. Their level of access into the computer should be authorized by data owners, and restricted and monitor by security administrator.The following were incorrect answers:Security Administrator -Security administrator is responsible for providing adequate and logical security for IS programs, data and equipment.Data Users '' Data users, including internal and external user community, are the actual user of computerized data.Data custodian is responsible for storing and safeguarding the data, and include IS personnel such as system analyst and computer operators.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 361

5. Right Answer: B
Explanation: For CISA exam you should know below information about Terminated Employee AccessTermination of employment can occur in the following circumstances:On the request of the employee (Voluntary resignation from service)Scheduled (On retirement or completion of contract)Involuntary (forced by management in special circumstances)In case of an involuntary termination of employment, the logical and physical access rights of employees to the IT infrastructure should either be withdrawn completely or highly restricted as early as possible, before the employee become aware of termination or its likelihood.This ensures that terminated employees cannot continue to access potentially confidential or damaging information from the IT resources or perform any action that would result in damage of any kind of IT infrastructure, applications and data. Similar procedure in place to terminate access for third parties upon terminating their activities with the organization.When it is necessary for employee to continue to have accesses, such access must be monitored carefully and continuously and should take place with senior management's knowledge and authorization.In case of a voluntary or scheduled termination of employment, it is management's prerogative to decide whether access is restricted or withdrawn. This depends on:The specific circumstances associated with each caseThe sensitivity of employee's access to the IT infrastructure and resourcesThe requirement of the organization's information security policies, standards and procedure.The following were incorrect answers:The other options presented are incorrectly describes about involuntary termination.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 361 and 362

Comments (0)

Search
Popular categories
Latest blogs
CA Foundation Business Economics Questions 2023 - Part 32
CA Foundation Business Economics Questions 2023 - Part 32
Questions 1. Generally an economy is considered under developed ifA) The standard of living of people & Productivity is low.B) Agriculture is the main occupation of the peopleC) The production techniques are backward.D) All of the above.2. Which of the following statement is correct?A) Agriculture occupies 10 per cent population of India.B) Nearly 5 per cent population of India is below the poverty line.C) The production techniques in agriculture are backward.D) None of the above.3. Which of the statements is correct?A) The tertiary sector contributes the maximum to the GDP.B) India is basically a socialist economy.C) The distribution of income and wealth is quite equitable.D) None of the above.4. In perfect competition in the short run there will be __________ possibilitiesA) Normal profits.B) Supernormal profits.C) LossD) All of above5. ______________ measure generally gives the lowest estimate of unemployment especially for poor economy.A) Usual status.B) CWS.C) CDS.D) CMS. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: DExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

CA Foundation Business Economics Questions 2023 - Part 31
CA Foundation Business Economics Questions 2023 - Part 31
Questions 1. When the price of a complementary of commodity X falls, the demand for X-A) FallsB) RisesC) Remains unchangedD) any of the above2. Which of the following is the method of measuring elasticity of demand when change in price of a commodity is substantial?A) Arc methodB) Point methodC) Percentage methodD) none of the above3. FERA stands for -A) Foreign Exchange Recommendation ActB) Foreign Exchange Regulation ActC) Finance and Export Regulation AssociationD) Funds Export Revaluation Act4. Nearly _____percent of working population is engaged in the service sector.A) 23 per centB) 45 per centC) 80 per centD) 50 per cent5. ACRP stands for â??A) Agro-Commodity Regional PlanningB) Agro-Climatic Rational PlanningC) Agro-Climatic Regional PlanningD) Allied-Climatic Regional Planning Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

CA Foundation Business Economics Questions 2023 - Part 30
CA Foundation Business Economics Questions 2023 - Part 30
Questions 1. Literacy rate calculated considering total population into account is known asA) Crude Literacy RateB) Total Literacy RateC) Mean Literacy RateD) None of the above2. In order to encourage investment in the economy, the RBI mayA) Increase Bank RateB) Sell securities in the open marketC) Buy securities in the open marketD) None of above3. Most of unemployment in India is __________A) VoluntaryB) StructuralC) FrictionalD) Technical4. Under a Command economy â??A) State plays a major roleB) Market plays major roleC) Both a & bD) Neither a nor b5. _______is the apex bank for agriculture credit in India.A) RBIB) SIDBIC) NABARDD) ICICI Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

All blogs