Home
Mcqs
Quizes
Q&A
Past Paper
blog
Spaces
Join Now
Sign in
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
What is the significance of a 'risk-based audit approach' in IS auditing?
A. Ensures audit compliance.
B. Focuses on areas with the highest risk.
C. Reduces audit scope.
D. Simplifies audit procedures.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
Which of the following is a key consideration when assessing the adequacy of backup procedures during an IS audit?
A. Backup frequency.
B. Backup media cost.
C. User access to backups.
D. Backup software vendor.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
What is the main focus of 'data integrity' controls in information systems?
A. Ensuring data availability.
B. Ensuring data accuracy and consistency.
C. Preventing unauthorized access.
D. Enhancing system performance.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
Which of the following best describes 'penetration testing' in an IS audit?
A. Simulating attacks to identify vulnerabilities.
B. Reviewing user access logs.
C. Testing software functionality.
D. Auditing financial transactions.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
What is the primary benefit of 'integrated auditing' in the context of IS audits?
A. Focus on financial data.
B. Combined assessment of IT and business processes.
C. Reduced audit costs.
D. Increased audit frequency.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
During an IS audit, what is the importance of 'evidence reliability'?
A. It determines audit fees.
B. It ensures audit efficiency.
C. It impacts audit conclusions.
D. It improves audit speed.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
What is the main goal of an IT audit program?
A. Ensure IT budget compliance.
B. Assess IT infrastructure costs.
C. Evaluate IT control effectiveness.
D. Monitor IT project timelines.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
Which of the following is a detective control in information systems?
A. Firewalls.
B. Encryption.
C. Audit logs.
D. Password policies.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
What is the role of 'audit trails' in information systems auditing?
A. Document changes and transactions.
B. Improve system performance.
C. Enhance data accuracy.
D. Ensure system compatibility.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
Which of the following best describes 'continuous auditing'?
A. Annual audit cycles.
B. Periodic audits.
C. Real-time audit processes.
D. Post-implementation reviews.
‹
1
2
3
›
COMPUTER SCIENCE & IT
Web Design & Development
Database Management Systems
Computer Networks & Security
Operating Systems
Data Structures & Algorithms
Information Systems Auditing Process
Governance and Management of Information Technology
Information Systems Acquisition Development & Implementation
Information Systems Operations and Business Resilience
Protection of Information Assets
Programming
Cybersecurity
Software Engineering
Computer Science