Question: 1. it is known that database performance can be improved by denormalizing some tables, which is what the organization's database administrator is recommending. what would
1. it is known that database performance can be improved by denormalizing some tables, which is what the organization's database administrator is recommending. what would this result in?
A. Decrease in data anomalies and availability
B. Decreased data redundancy
C. Increased data redundancy
D. Increase in data confidentiality
E. Decrease in data confidentiality
2.Microsoft has released patches fixing security flaws in MS SQL Server. Which of the following shoud you (an auditor) recommend in this situation?
A. Ignore the patches Microsoft released since MS SQL Server is super secure already
B. Ask Microsoft for a new software version with all the patches pre-installed
C. INstall all the patches immediately since Microsoft is a reputable vendor and they already tests their patches before rolling them out
D. Assess the impact of the MS SQL Server patches prior to installation
3. The (1)____ describes all the business processes and assets that will be included in the audit, whereas the(2)_____ documents the authority, scope, and responsibilities of the audit.
A. audit engagement letter, audit WBS
B. audit charter, audit universe
C. audit universe, audit charter
D. board of directors, audit logs
E. audit WBS , audit engagement letter
4. The amount and type of data to be collected and analyzed during an audit should be determined by:
A. Scope and Purpose of the Audit
B. Auditor's Available Storage on Their Data Collection Devices
C.Budget Allocated for the Audit
D. Auditee's Availability of the Requried Data for the Audit
E. Time Frame of the Audit
5. Which of the following is a role of a corporate public key infrastrcture's(PKI) certificate authority(CA) utilizing X.509 digital certificates?
A. It links the digital certificate's private key to an individual's identity
B. It links the digital certificate's public key to an individual's identity
C. It links the digital certificate's symmetric key to an individual's identity
D. It links the digital certificate's private key to an individual's biometrics( like fingerprint or iris)
E. It links the digital certificate's private key to an individual's authenticaton factor (like password or pin)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
