MCQ Knowledge Flashcards

1
Q

What are the components of final acceptance testing?

A
  1. Quality Assurance testing
  2. User Acceptance Testing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Quality Assurance Testing Focus on?

A
  1. Focuses on technical aspects of the application.
  2. Tests the logical design and underlying technology to validate that the application is well documented.
  3. verifies that the application aligns with the tech specs documentation.
  4. Conducted primarily by the IT department with minimal end-user.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does User Acceptance Testing require?

A
  1. Focused on function functionality.
  2. Helps determine if the application release is ready for production deployment.
  3. Testing should be performed in a secure environment to ensure protection of both the source code and executable code.
  4. Testing is performed by the IT department and the end users. The tests are designed from an end users perspective and test scenarios should closely mimic the application functionality in production.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Audit Program

A

An audit program is a written outline of work to be done during an audit. It may include a description of the scope, time to be allotted, personnel assignments, and procedures to be undertaken to serve as a guide for the auditor and the assistants. As the end result of the audit planning stage, this step-by-step plan is designed with the intent to help guide the auditors in gathering the evidence that underlies their conclusions and/or opinion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a hot site?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Output Controls

A

Provide assurance that the data delivered to users will be presented, formatted, and delivered in a consistent and secure manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall Security Systems

A

They protect internal information systems from external attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Steps for Computer Forensics

A
  1. Identify
    1. identify and establish the investigation objectives
  2. Preserve
    1. Evidence from the crime scence must securely retained and preserved to present in a legal proceeding.
  3. Analyze
    1. Evidence needs to be analyzed and evaluated to help conclude accurately.
  4. Preserve
    1. Analyzed evidence must be structured in presentable format that helps convince stakeholders, including management, lawyers, and the court.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly