Login
Remember
Register
User Robindeniel
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by Robindeniel
0
votes
How do I scheduling a Workflow?
answered
May 25, 2023
in
Informatica
schedulingworkflow
0
votes
How to use PMCMD Utility Command?
answered
May 25, 2023
in
Informatica
pmcmdutility
command
0
votes
Which of the following symmetric algorithms is a block cipher that the U.S. government adopted as AES to replace DES?
answered
May 20, 2023
in
CISA
symmetric
algorithms
0
votes
An auditor should recommend the use of which of the following to determine the minimum level of service needed at an alternate site?
answered
May 20, 2023
in
CISA
level
of
service
0
votes
From an auditing perspective, which of the following standards most closely maps to a Plan-Do-Check-Act (PDCA) approach?
answered
May 20, 2023
in
CISA
cmm
0
votes
Where should an organization keep copies of the business continuity plan?
answered
May 20, 2023
in
CISA
businesscontinuityplan
0
votes
In project management, which of the following is a task related to closing a project?
answered
May 20, 2023
in
CISA
project
management
0
votes
Observation and testing can be used effectively in which of the following areas?
answered
May 20, 2023
in
CISA
observation
testing
0
votes
During which step of the audit life cycle does an auditor identify which skills are needed for the audit, how many auditors are required, and what other resources are needed?
answered
May 20, 2023
in
CISA
auditoridentify
0
votes
In the NIST version of the SDLC process, the system or program performs the work for which it was designed in which waterfall phase?
answered
May 20, 2023
in
CISA
nist-version
0
votes
Which database-related term refers to the process of combining several low-sensitivity items to produce a high-sensitivity data item?
answered
May 20, 2023
in
CISA
database-related
term
0
votes
When a system moves into production and changes are needed, which of the following is the final step in the change control process?
answered
May 20, 2023
in
CISA
system
moves
0
votes
The network of an organization has been the victim of several intruders’ attacks. Which of the following measures would allow for the early detection of such incidents?
answered
May 20, 2023
in
CISA
organizationnetwork
0
votes
A company has decided to implement an electronic signature scheme based on public key infrastructure. The user’s private key will be stored on the computer’s hard drive and protected by a
answered
May 20, 2023
in
CISA
public
key
infrastructure
0
votes
An IS auditor selects a server for a penetration test that will be carried out by a technical specialist. Which of the following is MOST important?
answered
May 20, 2023
in
CISA
is
auditor
0
votes
After observing suspicious activities in a server, a manager requests a forensic analysis.
answered
May 20, 2023
in
CISA
forensic
analysis
0
votes
Which of the following would be the GREATEST cause for concern when data are sent over the Internet using HTTPS protocol?
answered
May 20, 2023
in
CISA
https
protocol
0
votes
A firewall is being deployed at a new location. Which of the following is the MOST important factor in ensuring a successful deployment?
answered
May 20, 2023
in
CISA
firewall
successful
deployment
0
votes
The human resources (HR) department has developed a system to allow employees to enroll in benefits via a web site on the corporate Intranet.
answered
May 20, 2023
in
CISA
ssl
encryption
0
votes
What is the MOST prevalent security risk when an organization implements remote virtual private network (VPN) access to its network?is
answered
May 20, 2023
in
CISA
vpn
logon
Page:
« prev
1
...
17
18
19
20
21
22
23
24
25
26
27
...
199
next »
...