Users Online
· Guests Online: 52
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
Forum Threads
Newest Threads
No Threads created
Hottest Threads
No Threads created
Latest Articles
Articles Hierarchy
Isaca- CISA
Question ID 22453 |
The output of the risk management process is an input for making: |
Option A |
business plans. |
Option B |
audit charters. |
Option C |
security policy decisions. |
Option D |
software design decisions. |
Correct Answer | C |
Update Date and Time 2018-03-30 05:11:14
Question ID 22454 |
An IS auditor was hired to review e-business security. The IS auditor's first task was to examine each existing e-business application looking for vulnerabilities. What would be the next task? |
Option A |
Report the risks to the CIO and CEO immediately |
Option B |
Examine e-business application in development |
Option C |
Identify threats and likelihood of occurrence |
Option D |
Check the budget available for risk management |
Correct Answer | C |
Description An IS auditor must identify the assets, look for vulnerabilities, and then identify the threats and the likelihood of occurrence. Choices A, B and D should be discussed with the CIO, and a report should be delivered to the CEO. The report should include the findings along with priorities and costs.
Update Date and Time 2018-03-30 05:12:20
Comments
No Comments have been Posted.
Post Comment
Please Login to Post a Comment.