FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2024-03-31.q980 Dumps
  • ««
  • «
  • …
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • …
  • »
  • »»
Download Now

Question 711

Company.com has contracted with an external consulting firm to implement a commercial financial system
to replace its existing in-house developed system. In reviewing the proposed development approach, which
of the following would be of GREATEST concern?

Correct Answer: B
Section: Protection of Information Assets
Explanation:
A quality plan is an essential element of all projects. It is critical that the contracted supplier be required to
produce such a plan. The quality plan for the proposed development contract should be comprehensive
and encompass all phases of the development and include which business functions will be included and
when. Acceptance is normally managed by the user area, since they must be satisfied that the new system
will meet their requirements. If the system is large, a phased-in approach to implementing the application is
a reasonable approach. Prototyping is a valid method of ensuring that the system will meet business
requirements.
insert code

Question 712

Which of the following is the GREATEST advantage of elliptic curve encryption over RSA encryption?

Correct Answer: A
Explanation/Reference:
Explanation:
The main advantage of elliptic curve encryption over RSA encryption is its computation speed. This method was first independently suggested by Neal Koblitz and Victor S.
Miller. Both encryption methods support digital signatures and are used for public key encryption and distribution. However, a stronger key per se does not necessarily guarantee better performance, but rather the actual algorithm employed.
insert code

Question 713

Which of the following software development methods is based on iterative and incremental development,
where requirements and solutions evolve through collaboration between self-organizing, cross-functional
teams?

Correct Answer: A
Section: Information System Acquisition, Development and Implementation
Explanation/Reference:
For your exam you should know below information about agile development:
Agile software development is a group of software development methods based on iterative and
incremental development, where requirements and solutions evolve through collaboration between self-
organizing, cross-functional teams. It promotes adaptive planning, evolutionary development and delivery, a
time-boxed iterative approach, and encourages rapid and flexible response to change. It is a conceptual
framework that promotes foreseen tight iterations throughout the development cycle.
Agile Development

The Agile Manifesto introduced the term in 2001. Since then, the Agile Movement, with all its values,
principles, methods, practices, tools, champions and practitioners, philosophies and cultures, has
significantly changed the landscape of the modern software engineering and commercial software
development in the Internet era.
Agile principles
The Agile Manifesto is based on twelve principles:
Customer satisfaction by rapid delivery of useful software
Welcome changing requirements, even late in development
Working software is delivered frequently (weeks rather than months)
Close, daily cooperation between business people and developers
Projects are built around motivated individuals, who should be trusted
Face-to-face conversation is the best form of communication (co-location)
Working software is the principal measure of progress
Sustainable development, able to maintain a constant pace
Continuous attention to technical excellence and good design
Simplicity-the art of maximizing the amount of work not done-is essential
Self-organizing teams
Regular adaptation to changing circumstances
What is Scrum?
Scrum is the most popular way of introducing Agility due to its simplicity and flexibility. Because of this
popularity, many organizations claim to be "doing Scrum" but aren't doing anything close to Scrum's actual
definition. Scrum emphasizes empirical feedback, team self-management, and striving to build properly
tested product increments within short iterations. Doing Scrum as it's actually defined usually comes into
conflict with existing habits at established non-Agile organizations.
The following were incorrect answers:
Software prototyping- Software prototyping, refers to the activity of creating prototypes of software
applications, i.e., incomplete versions of the software program being developed. It is an activity that can
occur in software development and is comparable to prototyping as known from other fields, such as
mechanical engineering or manufacturing.
Rapid application development (RAD) is a software development methodology that uses minimal planning
in favor of rapid prototyping. The "planning" of software developed using RAD is interleaved with writing the
software itself. The lack of extensive per-planning generally allows software to be written much faster, and
makes it easier to change requirements.
Component Based Development - It is a reuse-based approach to defining, implementing and composing
loosely coupled independent components into systems. This practice aims to bring about an equally wide-
ranging degree of benefits in both the short-term and the long-term for the software itself and for
organizations that sponsor such software.
The following reference(s) were/was used to create this question:
CISA review manual 2014 Page number 194
insert code

Question 714

Your final audit report should be issued:

Correct Answer: A
Explanation/Reference:
Explanation:
Reporting can take the forms of verbal presentation, an issue paper or a written audit report summarizing observations and management's responses. After agreement is reached on the observations, a final report can be issued.
insert code

Question 715

Upon receipt of the initial signed digital certificate the user will decrypt the certificate with the public key of the:

Correct Answer: B
A certificate authority (CA) is a network authority that issues and manages security credentials and public keys for message encryption. As a part of the public key infrastructure, a CA checks with a registration authority (RA) to verify information provided by the requestor of a digital certificate. If the RA verifies the requestor's information, the CA can issue a certificate. The CA signs the certificate with its private key for distribution to the user. Upon receipt, the user will decrypt the certificate with the CA's public key.
insert code
  • ««
  • «
  • …
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2024-03-31.q980 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.