Complete Real Exam Questions And Correct Answers
(Verified Answers) Already Graded A+ | Assured
Success | Newest Exam | Just Released!!
The database administrator suggests that database efficiency
can be improved
by denormalizing some tables. This would result in: -
ANSWER-increased
redundancy
What is the BEST backup strategy for a large database with
data supporting
online sales? - ANSWER-mirrored
hard disks
A hot site should be implemented as a recovery strategy when
the: - ANSWER-
disaster downtime
tolerance is low
As part of the business continuity planning process, which of
the following should be identified FIRST in the business impact
analysis? - ANSWER-critical business processes for
ascertaining the priority for recovery
,An IS auditor is performing a review of the disaster recovery
hot site used by a financial institution. Which of the following
would be the GREATEST concern? - ANSWER-disk space
utilization are not kept current
An IS auditor is reviewing an organization's disaster recovery
plan (DRP) implementation. The project was completed on time
and on budget. During the review, the auditor uncovers several
areas of concern. Which of the following presents the
GREATEST risk? - ANSWER-the business impact analysis was
conducted, but the results were not used
- The risk of not using the results of the BIA for disaster
recovery planning means that the disaster recovery plan (DRP)
may not be designed to recover the most critical assets in the
correct order. As a result, the plan may not be adequate to
allow the organization to recover from a disaster.
During an IS risk assessment of a healthcare organization
regarding protected healthcare information (PHI), an IS auditor
interviews IS management. Which of the following findings
from the interviews would be of MOST concern to the IS
auditor? - ANSWER-Staff have to type "[PHI]" in the subject
field of email messages to be encrypted.
During which of the following phases in system development
would user acceptance test plans normally be prepared? -
ANSWER-requirements definition
, During an application audit, the IS auditor finds several
problems related to corrupt data in the database. Which of the
following is a corrective control that the IS auditor should
recommend? - ANSWER-proceed with restore procedures
By evaluating application development projects against the
capability maturity
model (CMM), an IS auditor should be able to verify that:
- ANSWER-
predictable software processes are
followed
An IS auditor evaluating the resilience of a high-availability
network should be
MOST concerned if: - ANSWER-the servers are
clustered in one site
A database administrator (DBA) who needs to make emergency
changes to a database after normal working hours should log
in: - ANSWER-with their named account to make the changes
Which of the following types of firewalls provide the
GREATEST degree and
granularity of control? - ANSWER-
application gateway
application gateway - ANSWER-has specific proxies for each
service. To handle web services, it has a Hypertext
Transmission Protocol (HTTP) proxy that acts as an