Proper segregation of duties does not prohibit a quality control administrator from also being responsible for change control and problem management.

Correct Answer for the Question – Proper segregation of duties does not prohibit a quality control administrator from also being responsible for change control and problem management. is given below Proper segregation of duties does not prohibit a quality control administrator from also being responsible for change control and problem management.True or false?Proper segregation of duties … Read more

Obtaining user approval of program changes is very effective for controlling application changes and maintenance. True or false?

Correct Answer for the Question – Obtaining user approval of program changes is very effective for controlling application changes and maintenance. True or false? is given below Obtaining user approval of program changes is very effective for controlling application changes and maintenance. True or false?Obtaining user approval of program changes is very effective for controlling application … Read more

If a programmer has update access to a live system, IS auditors are more concerned with the programmer’s ability to initiate or modify transactions and the ability to access production than with the programmer’s ability to authorize transactions. True or false?

Correct Answer for the Question – If a programmer has update access to a live system, IS auditors are more concerned with the programmer’s ability to initiate or modify transactions and the ability to access production than with the programmer’s ability to authorize transactions. True or false? is given below If a programmer has update access … Read more

IS auditors are MOST likely to perform compliance tests of internal controls if, after their initial evaluation of the controls, they conclude that control risks are within the acceptable limits. True or false?

Correct Answer for the Question – IS auditors are MOST likely to perform compliance tests of internal controls if, after their initial evaluation of the controls, they conclude that control risks are within the acceptable limits. True or false? is given below IS auditors are MOST likely to perform compliance tests of internal controls if, after … Read more

Machines that operate as a closed system can NEVER be eavesdropped.

Correct Answer for the Question – Machines that operate as a closed system can NEVER be eavesdropped. is given below Machines that operate as a closed system can NEVER be eavesdropped.Any data that is transmitted over a network is at some risk of being eavesdropped, or even modified by a malicious person. Even machines that operate … Read more

Fourth-Generation Languages (4GLs) are most appropriate for designing the application’s graphical user interface (GUI). They are inappropriate for designing any intensive data-calculation procedures. True or false?

Correct Answer for the Question – Fourth-Generation Languages (4GLs) are most appropriate for designing the application’s graphical user interface (GUI). They are inappropriate for designing any intensive data-calculation procedures. True or false? is given below Fourth-Generation Languages (4GLs) are most appropriate for designing the application’s graphical user interface (GUI). They are inappropriate for designing any intensive … Read more

When used in time-sharing environments that process a large number of transactions. True or false?

Correct Answer for the Question – When used in time-sharing environments that process a large number of transactions. True or false? is given below An advantage of a continuous audit approach is that it can improve system security when used in time-sharing environments that process a large number of transactions. True or false?It is true that … Read more

Digital signatures require the sender to “sign” the data by encrypting the data with the sender’s public key, to then be decrypted by the recipient using the recipient’s private key. True or false?

Correct Answer for the Question – Digital signatures require the sender to “sign” the data by encrypting the data with the sender’s public key, to then be decrypted by the recipient using the recipient’s private key. True or false? is given below Digital signatures require the sender to “sign” the data by encrypting the data with … Read more

ALL computer programming languages are vulnerable to command injection attack.

Correct Answer for the Question – ALL computer programming languages are vulnerable to command injection attack. is given below ALL computer programming languages are vulnerable to command injection attack.The majority of software vulnerabilities result from a few known kinds of coding defects. Common software defects include buffer overflows, format string vulnerabilities, integer overflow, and code/command injection. … Read more

Although DRP results in an increase of pre-and post-incident operational costs, the extra costs are more than offset by reduced recovery and business impact costs. True or false?

Correct Answer for the Question – Although DRP results in an increase of pre-and post-incident operational costs, the extra costs are more than offset by reduced recovery and business impact costs. True or false? is given below With the objective of mitigating the risk and impact of a major business interruption, a disasterrecovery plan should endeavor … Read more