Professional Documents
Culture Documents
(237650@icai.org)
Status : Fail
Assessment Date : 27-04-2023 18:13:08 (GMT+05:30)
Performance Level : Low
25.83 L
Your Performance
Percentage Category
Excellent
Outstanding level of performance indicates that the candidate has done excellent work and mastered the concepts.
High
High level of performance indicates that the candidate has done above average work and mastered almost all the concepts.
Moderate
Acceptable level of performance indicates that the candidate has done average work and has mastered many of the concepts.
Low
Needs improvement in performance indicates that the candidate has done and mastered very few or none of the concepts.
Performance Criteria
ISA 3 0 (DAAB) 109.20 and above 97.20 to 108.00 73.20 to 96.00 Below 72.00
Overall Score 109.20 and above 97.20 to 108.00 73.20 to 96.00 Below and equal to 72.00
Where do you stand?
TIME AVERAGE
MARKS AVERAGE SPENT TIME YOUR YOUR MAX NO OF MARKED
SECTION SCORED MARKS BY SPENT SECTION SECTION TOTAL QUESTIONS QUESTIONS CORRECT INCORRECT UNANSWERED FOR
(GROUP) BY YOU OF YOU BY PERCENTAGE ACCURACY QUESTIONS - TO ATTEMPTED REVIEW
OTHERS (IN OTHERS ATTEMPT
MINS) (IN MINS)
ISA 3 0
31.00 53.67 39:22 76:58 25.83% 25.83% 120 120 120 31 89 0 0
(DAAB)
Total 31.00 53.67 39:22 76:58 25.83% 25.83% 120 120 120 31 89 0 0
Note:The percentage (%) and accuracy below the prescribed values (60 %) are shown in red color
Below pie-chart shows section-wise percentage of marks scored and bar graph gives a comparison of your marks with your peers who cleared the assessment
48
36
24
12
ISA 3 0, 31
0
30
ISA
Your marks
Average marks of others who cleared this assessment
ISA 3 0
2020 Online Exam wise Count Analysis 2020 Online Exam wise Score Analysis
30 10
23
8
24 8
7
18
17
6
16
15
18 6
Count
Score
4
12 4
8
7
6
6 2
4
0
0
0
0
0
0
0
0
0
0
0
0 0
..
.
..
...
..
..
I...
..
..
T..
T..
D.
TI.
N.
N.
G.
N.
AC
QU
DI
MA
NA
AU
MA
TIO
IO
LA
T,
AU
AC
AT
GU
OR
MA
EN
EM
LA
EM
RM
EM
T,
RE
NF
GU
PM
ST
EM
ST
EN
FO
ST
I
SY
ND
RE
SY
LO
OF
ST
PM
SY
IN
N
TA
ND
VE
SY
N
LO
IO
OF
IO
DE
TIO
AC
N
IO
TA
AT
VE
AT
IO
N
AT
EM
EC
RM
IT
AC
DE
TIO
RM
AT
RM
OT
C,
ST
FO
RM
IT
EM
FO
EC
GR
SY
FO
PR
C,
IN
OT
IN
ST
FO
GR
IN
SY
PR
IN
Correct Count Incorrect Count
Unanswered Count Marked For Review Count Correct Score Incorrect Score
SECTION(GROUP) NUMBER OF INCORRECT RESPONSES MARKS LOST DUE TO INCORRECT RESPONSES TOTAL SCORE IF INCORRECT RESPONSES WERE NOT MARKED
ISA 3 0(grp1) 89 0 31
Overall 89 0 31.00
In order to attempt more accurately, consider the following suggestions while attempting the questions:
1. If you are not able to solve a question correctly or have doubts in your approach towards the solution, skip it for later.
2. Quickly revise the steps for avoiding calculation or casual mistakes.
3. Avoid guesswork.
Time Management
Below table shows the time you spent in each section and the average time spent by others(students who cleared this assessment).
SECTION (GROUP) TIME SPENT BY YOU (IN MINS) AVERAGE TIME SPENT BY OTHERS (IN MINS)
19.23
12
8.8
8
1.82
1.75
1.65
1.55
2.8
0.92
0.57
0.28
4
0
0
0
0
0
0
0
0
0
0
0
...
...
...
...
R..
ST
PM
ST
NF
ND
SY
SY
I
LO
OF
TA
N
N
VE
IO
IO
N
AC
DE
TIO
AT
AT
IT
EM
RM
RM
EC
C,
ST
OT
FO
FO
GR
SY
PR
IN
IN
Time spent on correct
Time spent on incorrect
Time spent on unanswered
Time spent on marked for review
Recommendations
1. It is essential for each aspirant to plan and schedule time for each section diligently. This is important to score well in each section and ultimately meet the cut-off.
2. This will also help you in attempting all the questions in each section and hence not missing the opportunity to score more.
ISA 3 0 (DAAB) 1 7 3 0 0
Overall 1 7 3 0 0
It is suggested that guesswork should be avoided for any type of response changes. It has been observed that more often than not, guesswork leads to an incorrect
response thereby inviting negative marks which in turn has an adverse effect on the overall rank.
You must use your knowledge, observation and elimination skills to arrive at the correct answer.
MARKS SCORED AVERAGE MARKS OF ISA 3 0 HIGHEST ISA 3 0 MARKS SCORED YOUR SECTION YOUR SECTION TIME SPENT BY AVERAGE TIME SPENT BY
BY YOU OTHERS SCORE BY THE TOPPER PERCENTAGE ACCURACY YOU (IN MINS) OTHERS (IN MINS)
112.00 /
31.00 / 120.00 53.67 / 120.00 112.00 / 120.00 25.83% 25.83% 39:22 76:58
120.00
Note:The percentage (%) and accuracy below the prescribed values (60%) are shown in red color
Question wise Analysis
Correct, 31
= Not Evaluated = Evaluated = Correct = Incorrect = Not Attempted = Marked for Review
= Answered = Correct Option = Your Option
Question Details
Q1. Which of the following should an IS auditor do when they find that a critical Disaster Recovery Plan (DRP) does not cover all of the
systems?
Options :
Timespent (in sec): 80 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q2. The best objective for the creation of an audit charter is to:
Options :
Timespent (in sec): 46 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 1 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q3. Which of the following is regarded as the most secure transmission medium?
Options :
1. Fiber optic wires
2. A UTP
3. A twisted-pair wire
4. A copper wire
Timespent (in sec): 11 Correct to Incorrect: 0 Incorrect to Correct: 1 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q4. The best auditing tool to capture transactions as per the predefined criteria is:
Options :
Timespent (in sec): 73 Correct to Incorrect: 0 Incorrect to Correct: 1 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q5. Which of the following is used in an e-commerce application to ensure that a Transaction is enforceable?
Options :
1. Access control
2. Authentication
3. Encryption
4. Non-repudiation
Timespent (in sec): 15 Correct to Incorrect: 0 Incorrect to Correct: 1 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q6. An advantage of using a bottom-up approach as opposed to a top-down Approach is:
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
Timespent (in sec): 58 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 1 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q7. Which of the following is the fastest technique for determining data-file Change management controls?
Options :
Timespent (in sec): 28 Correct to Incorrect: 0 Incorrect to Correct: 1 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Correct
Options :
1. Scope creep
2. Inadequate security
3. High resource requirements
4. Inadequate UAT
Timespent (in sec): 33 Correct to Incorrect: 0 Incorrect to Correct: 1 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q9. The most effective method for conducting stress tests is:
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Correct
Options :
Timespent (in sec): 58 Correct to Incorrect: 0 Incorrect to Correct: 1 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q10. What is the most important aspect for patch updating for an operating system?
Options :
1. Post-update regression testing
2. Approval from the owner of the information system asset
3. Approval from the information security team
4. Adequate training for the system administrator
Timespent (in sec): 39 Correct to Incorrect: 1 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Options :
1. Group IT assets
2. Categorize IT assets
3. Implement an access control list
4. Creating an inventory of IT assets
Timespent (in sec): 50 Correct to Incorrect: 0 Incorrect to Correct: 1 Incorrect to Incorrect: 1 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q12. An IS auditor’s role in implementing a CSA should be:
Options :
1. They're in charge
2. They're a sponsor
3. They're a reviewer
4. They're a facilitator
Timespent (in sec): 1055 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q13. Which of the following should be the first exercise while reviewing data center Security?
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q14. What is the most important function that IS management performs in such Situations where an organization has outsourced
some of its IS processes?
Options :
1. Ensuring that charges for outsourcing are paid in compliance with the SLA
2. Providing training to the staff of outsourcing vendors
3. Levying a penalty for non-compliance
4. Monitoring the outsourcing provider's performance
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Options :
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q16. Which of the following options best describes the process of assessing a risk?
Options :
1. Subject-oriented
2. Object-oriented
3. Mathematics-oriented
4. Statistics-oriented
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Options :
1. Implementing application-level access control
2. Encrypting databases
3. Enabling HTTPS control
4. Deploying network monitoring control
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q18. An IS auditor notes that several incidents were assigned the wrong priorities And hence were not able to achieve the defined SLA.
Which of the following is The most important concern?
Options :
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q19. Which of the following type of test would be relevant when an organization Needs to determine whether a replacement or
modified system is capable of Functioning in its target environment without affecting other existing systems?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Correct
Options :
1. Regression testing
2. Sociability testing
3. Interface/integration testing
4. Pilot testing
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q20. An organization has implemented two-factor authentication that involves a Token and a PIN. Which of the following is an
important rule to be included in The security policy?
Options :
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q21. The most important consideration when establishing an offsite facility is the Fact that:
Options :
1. The offsite facility is located at a different geographical location and is Not subject to the same risks as the primary site
2. The offsite facility is provided with the same level of protection as the Primary site
3. The offsite facility is managed by a reliable third party
4. The offsite facility is approved by the Board of Directors
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q22. Which audit involves the independent evaluation of software products, Verifying it's configuration items?
Options :
1. Functional audit
2. Integrated audit
3. Specialized audit
4. Compliance audit
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
1. Top-down
2. Black box
3. Bottom-up
4. White box
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q24. The technique to evaluate project progression in terms of time, cost, and Schedule, and to determine estimates of these by
completion, is which of the Following?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Correct
Options :
1. EVA
2. FPA
3. PERT
4. CPM
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Options :
1. Ensuring that software has not subsequently modified
2. Ensuring smooth integration with other code-signed systems
3. Ensuring the integrity of the private key
4. Ensuring the availability of the system
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q26. The BEST way to schedule a follow-up for audit findings is to:
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q28. An IS auditor notes that users are granted occasional authority to change a System. What should the IS auditor's first step be?
Options :
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q29. Which of the following alternate sites is already provisioned with basic Infrastructure, such as electric cabling, heating, ventilation
and AC Arrangements, and flooring, but does not have systems and other Communications equipment?
Options :
1. A cold site
2. A warm site
3. A hot site
4. A mirrored site
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q31. Following the merger of two companies, a new common interface would Replace several self-developed legacy applications.
Which of the following Options constitutes the biggest risk?
Options :
1. Project management and progress reporting is integrated in an External consultant-driven project management department
2. The substitute plan consists of several independent projects without Incorporating resource allocation in an approach to portfolio Management
3. Each organization's resources become inefficiently distributed as they Become acquainted with the legacy systems of the other organization
4. The new platform would push both company's business areas to adjust Their job procedures, resulting in extensive training requirements
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Options :
1. Benchmarking with industry standards
2. Log capturing
3. Server utilization reports
4. Network protocol reports
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q33. An IS auditor noted a system vulnerability. To address all the undetected Vulnerabilities, which of the following tests is
recommended?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Correct
Options :
1. Integration testing
2. Stress testing
3. System testing
4. Security testing
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q35. To implement access control, which of the following is the first step?
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q36. Which of the following is a major concern regarding the use of the DHCP?
Options :
1. Use of the application layer firewall
2. Access to the network port is not restricted
3. Antivirus software is updated every month
4. Two-factor authentication is implemented
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q37. An IS auditor noted that a project, which is expected to be completed in 2 Years, has utilized only 25% of the budget after
completion of the first year. The auditor should first determine which of the following?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q38. The most important consideration in a business case is which of the following?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Correct
Options :
1. The cost of the project
2. The resource requirements for the project
3. The ROI of the project
4. The security requirements of the project
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q39. The audit function should be reported to the audit committee of the board Because:
Options :
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q40. With respect to the IT security baseline, the IS auditor should first ensure:
Options :
1. The documentation
2. Sufficiency
3. Audit and compliance
4. The process
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q41. To determine whether an organization has complied with a privacy Requirement, the IS auditor should first:
Options :
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q42. A PRIMARY advantage of the CSA program is that it:
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q43. Which of the following is considered the best method to prevent unauthorized Access to critical databases?
Options :
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Options :
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q45. Which of the following is looked at first by an IS auditor when reviewing the Security of the local area network?
Options :
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q46. The most effective method to protect the organization from identity theft is:
Options :
1. SSO
2. User-specific terminals
3. User access review
4. Two-factor authentication
Timespent (in sec): 5 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q48. The BIA determines:
Options :
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q49. Which of the following does the use of network performance monitoring tools Directly affect?
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q50. An IS auditor has observed inadequate controls of remote access for a critical Application. The auditor should:
Options :
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q51. Which of the following changeovers comes with the greatest risk?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
1. Parallel
2. Pilot
3. Phased
4. Direct cutover
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q53. An enterprise is considering investing significantly in infrastructure Improvements. Which of the following are the most critical
options to Consider?
Options :
1. A cost analysis
2. The safety risks associated with the latest technology
3. Compatibility with existing systems
4. A risk analysis
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q54. An IS auditor is conducting a post-implementation review of an ERM system. They are most likely to review:
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q55. The prime objective of assigning process ownership in a system development Project is to do which of the following?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q56. The prime advantage of an audit team directly extracting data from a general Ledger system is:
Options :
1. No dependency on an auditee
2. Quicker access to information
3. More flexibility in the audit process
4. More reliability of data
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q57. Which of the following is the best way to ensure that the service provider Adheres to the security requirements of the
organization?
Options :
1. By obtaining a sign-off from all the users of the service provider
2. By including an indemnity clause in the SLA with the service provider
3. By providing annual security awareness training for all users
4. By easing the security requirements
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Options :
Timespent (in sec): 6 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q59. To review the adequacy of management’s remediation action plan, the most Important factor is:
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q60. The main reason for meeting with auditees before formally releasing the audit Report is to:
Options :
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q61. Which of the following is an IS auditor's first step in reviewing access control For client server environments?
Options :
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q62. Which of the following is the primary criterion for determining the severity of Service disruption?
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Options :
1. FM-200 gas
2. Nitrogen
3. Water that resides in the pipe with special water-tight sealants
4. Water, but it enters the pipe only when a fire has been detected
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q64. Which of the following is a major concern for an IS auditor reviewing a thirdparty Agreement?
Options :
Timespent (in sec): 10 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q65. Which of the following is the most important aspect of planning an audit?
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q66. The most effective tool for obtaining audit evidence through digital data is:
Options :
Timespent (in sec): 5 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q67. An IS auditor notes that storage resources are continuously added. What Should they review?
Options :
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q68. Which of the following will help to protect a network from acting as a zombie In a denial-of-service attack?
Options :
1. Deny all incoming traffic with the source address of the critical host
2. Deny all incoming traffic with the spoofed source IP
3. Deny all incoming and outgoing traffic for the critical host
4. Deny all outgoing traffic with the external source address
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Options :
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q70. In a risk-focused audit, which of the following is the most critical step?
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q71. An IS auditor evaluating an IT governance framework will be more concerned About:
Options :
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q72. The document that delegates authority to the audit department is:
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q73. Which of the following is the best reason for a senior audit manager reviewing The work of an auditor?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
1. Quality requirements
2. SLA requirements
3. Professional standards
4. Client requirements
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q74. The IS auditor's primary focus during the post-implementation review is:
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q75. A major risk in the Agile development process is which of the following?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
1. Inadequate documentation
2. Inadequate testing
3. Inadequate requirement gathering
4. Inadequate user involvement
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q76. Which of the following is the most important clause to be included in an SLA?
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q77. Which of the following is the first step in the implementation of a problem Management mechanism?
Options :
1. Reporting an exception
2. Root cause analysis
3. Risk analysis
4. Ranking exceptions
Timespent (in sec): 6 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q79. In the prototyping method, change control can be impacted by which of the Following?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
1. User participation
2. Frequent changes in requirements and design
3. The trial-and-error method
4. Limited budgets
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q80. Which of the following can be considered most reliable evidence?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q81. A review of the change management process indicates that the process is not Fully documented and also that some migration
processes failed. What should The next step for the IS auditor be?
Options :
1. Trying to get further information about the findings through root Cause analysis
2. Report the findings to the audit committee of the board
3. Recommend reframing the change management process
4. Recommend discontinuing the migration process until the change Management process is documented
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q82. Which of the following is considered the most effective access control Mechanism?
Options :
1. A fingerprint scanner
2. A password
3. A cipher lock
4. An electronic access card
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q83. Which of the following is a major concern when IT is not involved in a system Selection procedure?
Options :
Timespent (in sec): 10 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q84. The test results of the DRP indicate that server performance at the recovery site Is slow. What should be the next course of action
for an IS auditor?
Options :
Timespent (in sec): 5 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q86. Which audit involves specific tests of controls to demonstrate adherence to Specific regulatory or industry standards?
Options :
1. Operational audit
2. Compliance audit
3. Integrated audit
4. Financial audit
Timespent (in sec): 6 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Options :
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q88. In an EDI environment, which of the following procedures ensures the Completeness of an inbound transaction?
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q89. How is existing database integrity best assured?
Options :
1. Log monitoring
2. Table link checks
3. Query time checks
4. Rollback features
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q90. The effectiveness of an IT governance implementation can be most effectively Determined by:
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q91. Which of the following is the greatest concern for an immediate cutover to the New system?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q92. An IS auditor should use professional judgement primarily to ensure:
Options :
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q93. The scope, authority, and responsibility of the IS audit function is defined by:
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q94. Which of the following provides the greatest assurance about the control Effectiveness of a third-party service provider?
Options :
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q95. Which of the following is the best process to use to test program changes?
Options :
1. Reviewing samples of change authorization first and then analyzing The relevant modified programs
2. Conducting a walk-through of the program changes from beginning to End
3. Reviewing samples of change authorization first and then analyzing The supporting change authorization
4. Using automated tools to analyze change authorization for missing Fields
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Options :
1. Atomicity
2. Structured Query Language
3. Table link error checks
4. Tracing and tagging
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q97. Which of the following is a major concern for an IS auditor reviewing the General IT controls of an organization?
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q98. The technique used by banks for the prevention of transposition and Transcription mistakes, thus ensuring the integrity of bank
account numbers Allotted to customers, is which of the following?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
1. Limit checks
2. Parity bits
3. Check digits
4. Range checks
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q99. Which of the following would be a major concern in the absence of established audit objectives?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Correct
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q100. The use of a CAAT tool will impact which of the following attributes of Evidence?
Options :
1. Appropriateness
2. Sufficiency
3. Reliability
4. Relevance
Timespent (in sec): 7 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q101. Which of the following should be revalidated first when planning to add more Personnel to the project to reduce the completion
time?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q102. What is the most reliable source of evidence for verifying an ISP's compliance With an SLA?
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q104. The BEST way for an IS auditor to follow up on the closure activities is to:
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q105. To achieve the organization's objective, the most important consideration for an IT department is to have which of the
following:
Options :
1. A budget-oriented philosophy
2. Long- and short-term strategies
3. The latest technology
4. Documented IT processes and guidelines
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q106. The IS auditor notes that the system malfunctioned after the installation of a Security patch. Which of the following is the best
control for such an incident?
Options :
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q107. The most effective and fastest backup strategy for data restoration is:
Options :
1. A full backup
2. A differential backup
3. A grandfather-father-son rotation backup
4. An incremental backup
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q108. The most important factor to be reviewed for an outsourced cloud hosting Service is which of the following?
Options :
1. Whether the vendor agrees to provide an internal audit report every Year
2. Whether the vendor agrees to provide an internal audit completion Certificate every year
3. Whether the vendor agrees to provide management certifications of Compliance to the organization as a policy every year
4. Whether the vendor agrees to provide an external independent audit Report every year
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q109. A test that is conducted when a system is in the development phase is:
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Incorrect
Options :
1. A sociability test
2. A functionality test
3. A load test
4. A unit test
Timespent (in sec): 4 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q110. An IS auditor should review the router controls and settings during:
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q111. The backup strategy that demands the highest media capacity for backup storage Is:
Options :
1. A full backup
2. A differential backup
3. A grandfather-father-son rotation backup
4. An incremental backup
Timespent (in sec): 5 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q112. Which of the following should be reviewed to determine the level of access Available for different users?
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q113. How should you determine the correctness of individual transaction balances That are migrated from one database to another?
Options :
Timespent (in sec): 5 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q114. In which of the following backup strategies is a backup taken of the full database Irrespective of the previous backup?
Options :
1. A full backup
2. A differential backup
3. A day's end backup
4. An incremental backup
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q115. Which of the following documents will help the most in developing a BCP?
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q116. Controls that predict potential problems before their occurrence are what kind Of controls?
Options :
1. Preventive controls
2. Detective controls
3. Corrective controls
4. Compensating controls
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q117. For an online transaction processing system's database, what is the integrity of Transactions maintained by?
Options :
Timespent (in sec): 3 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q118. The primary control objective of job rotations is to achieve which of the Following?
Options :
1. To provide cross-training
2. To motivate employees
3. To detect improper or illegal employee acts
4. To improve efficiency and productivity
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q119. Which of the following is the next step once the audit findings have been Identified?
2020 Online Exam : SYSTEM DEVELOPMENT, ACQUISITION, IMPLEMENTATION AND MAINTENANCE, APPLICATION SYSTEM AUDIT
Status : Correct
Options :
Timespent (in sec): 2 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q120. An IS auditor should first review which of the following biometric life cycle Stages?
Options :
Timespent (in sec): 459 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
0
6
12
18
24
30
IO
N
SY
ST
EM
AU 7
D. 17
GR ..
C,
IT 0
AC
TA 0
ND
RE
GU 6
LA
TI. 15
..
Correct Count
SY
ST 0
EM
DE 0
Unanswered Count
VE
LO
PM
EN
T, 8
AC
IN ... 16
FO
RM 0
AT
IO 0
N
SY
ST
EM
MA 6
N. 18
PR ..
OT
EC 0
TIO
0
Incorrect Count
N
OF
INF
OR 4
MA
2020 Online Exam wise Count Analysis
T..
. 23
Marked For Review Count
0
0
IN
FO
RM Score
AT
IO
0
2
4
6
8
10
N
SY
ST
EM
AU
GR DI
T.. 7
C, .
IT
AC
TA 0
ND
RE
GU
LA
TIO
SY N. 6
ST
EM ..
DE
0
Comparative Score Level Analysis
VE
LO
PM
EN
T,
AC
Correct Score
IN QU 8
FO I...
RM
AT
IO 0
N
SY
ST
EM
MA
PR NA 6
G.
OT ..
EC
TIO
N 0
Incorrect Score
OF
IN
FO
RM
AT
IO 4
2020 Online Exam wise Score Analysis
N.
..
0
2020 Online Exam wise Score Analysis
10
8
8
6
6
Score
4
4
0.55
0.48
0.42
0.38
0.24
2
0
.
..
I...
..
..
T..
N.
G.
N.
QU
DI
NA
TIO
IO
AU
AC
AT
MA
LA
RM
EM
T,
GU
EM
EN
FO
ST
RE
ST
PM
SY
IN
ND
SY
LO
N
OF
N
IO
TA
VE
IO
N
AT
AC
DE
TIO
AT
RM
RM
IT
EM
EC
FO
C,
OT
ST
FO
GR
IN
SY
PR
IN
CORRECT TO INCORRECT INCORRECT TO CORRECT INCORRECT TO INCORRECT CORRECT TO UNANSWERED INCORRECT TO UNANSWERED
1 7 3 0 0
Time Analysis: ISA 3 0
Below graph represent the time you spent in each section and the average time spent by others.
16
19.23
12
8.8
8
1.82
1.75
1.65
1.55
2.8
0.92
0.57
0.28
4
0
0
0
0
0
0
0
0
0
0
0
...
...
...
...
R..
ST
PM
ST
NF
ND
SY
SY
I
LO
OF
TA
N
N
VE
IO
IO
N
AC
DE
TIO
AT
AT
IT
EM
RM
RM
EC
C,
ST
OT
FO
FO
GR
SY
PR
IN
IN
1.32K
840
545
560
88.13
214
192
37.06
30.54
40.3
36.5
280
89
0 .
..
I...
..
..
T..
N.
N.
G.
QU
DI
NA
TIO
IO
AU
AC
AT
MA
LA
RM
EM
T,
GU
EM
EN
FO
ST
RE
ST
PM
SY
IN
ND
SY
LO
N
OF
N
IO
TA
VE
IO
N
AT
AC
DE
TIO
AT
RM
RM
IT
EM
EC
FO
C,
OT
ST
FO
GR
IN
SY
PR
IN
Note:The percentage (%) and accuracy below the prescribed values (60%) are shown in red color