Which of the following is an established systems development methodology?
A. Information Technology Infrastructure Library (ITIL).
B. COBIT
C. Waterfall.
D. Projects in Controlled Environments (PRINCE2).
正解:C
質問 2:
According to 11A guidance on IT, which of the following are indicators of poor change management?
1. Inadequate control design.
2. Unplanned downtime.
3. Excessive troubleshooting .
4. Unavailability of critical services.
A. 1, 2, and 3 only
B. 2, 3, and 4 only
C. 1, 3, and 4 only
D. 2 and 3 only.
正解:B
質問 3:
In accounting, which of the following statements is true regarding the terms debit and credit?
A. Credit means an increase in an account and debit means a decrease
B. Debit means an increase in an account and credit means a decrease.
C. Debit indicates the right side of an account and credit the left side
D. Credit indicates the right side of an account and debit the left side.
正解:A
質問 4:
Which of the following would most likely serve as a foundation for individual operational goats?
A. Individual skills and capabilities.
B. Targets of key performance indicators
C. Alignment with organizational strategy.
D. Financial and human resources of the unit.
正解:B
質問 5:
When executive compensation is based on the organization's financial results, which of the following situations is most likely to arise?
A. The organization experiences increasing discontent of employees, if executives are eligible for compensation amounts that are deemed unreasonable.
B. The organization encourages employee behavior that is inconsistent with the interests of relevant stakeholders.
C. The organization uses an unreliable process forgathering and reporting executive compensation data.
D. The organization reports inappropriate estimates and accruals due to poof accounting controls.
正解:B
質問 6:
Which of the following items best describes the strategy of outsourcing?
A. Contract -ng operation of some business functions with an internal service provider
B. Contracting functions or knowledge-related work with an external service provider.
C. Contracting the work to Foreign Service providers to obtain lower costs
D. Contracting a specific external service provider to work with an internal service provider
正解:C
質問 7:
Which of the following is the most appropriate beginning step of a work program for an assurance engagement involving smart devices?
A. Test encryption of all smart devices
B. Understand what procedures are in place for locking lost devices
C. Train all employees on bring-your-own-device (BYOD) policies.
D. Obtain a list of all smart devices in use
正解:D
質問 8:
Which of the following is a sound network configuration practice to enhance information security?
A. Interfaces reinforce segregation of duties between operations administration and database development.
B. Change management practices to ensure operating system patch documentation is retained.
C. User role requirements are documented in accordance with appropriate application-level control needs.
D. Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity.
正解:D
Shimizu -
順調にIIA-CIA-Part3試験をパスしました。今後ともよろしくお願い申し上げます。