Which of the following should be the FIRST step in a data migration project?
Correct Answer: C
Explanation Data migration is the process of moving data from one system to another, which may involve changes in storage, database, or application. To perform a successful data migration, it is essential to understand the data structure of the new system, which defines how the data is organized, stored, and accessed. Understanding the new system's data structure will help determine the following aspects of the data migration project: The scope and requirements of the data migration, such as what data needs to be migrated, how much data needs to be migrated, and what are the quality and performance expectations. The data mapping and transformation rules, such as how the data elements from the source system correspond to the data elements in the target system, and what transformations or conversions are needed to ensure compatibility and consistency. The data validation and testing methods, such as how to verify that the migrated data is accurate, complete, and functional in the new system, and how to identify and resolve any errors or issues. Therefore, understanding the new system's data structure is a crucial first step in a data migration project, as it lays the foundation for the subsequent steps of data extraction, transformation, loading, validation, and testing.
Question 892
Which of the following is a data validation edit and control?
Correct Answer: B
Explanation/Reference: Explanation: A reasonableness check is a data validation edit and control, used to ensure that data conforms to predetermined criteria.
Question 893
Which of the following is an example of a passive attack initiated through the Internet?
Correct Answer: A
Section: Protection of Information Assets Explanation: Internet security threats/vulnerabilities are divided into passive and active attacks. Examples of passive attacks include network analysis, eavesdropping and traffic analysis. Active attacks include brute force attacks, masquerading, packet replay, message modification, unauthorized access through the Internet or web-based services, denial-of-service attacks, dial-in penetration attacks, e-mail bombing and spamming, and e-mail spoofing.
Question 894
An IS auditor finds that corporate mobile devices used by employees have varying levels of password settings. Which of the following would be the BEST recommendation?
Correct Answer: D
Question 895
Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
Correct Answer: B
Explanation Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is unchanged. This is because end users are still the ultimate customers and beneficiaries of the system, and they need to ensure that the software package meets their requirements, expectations, and satisfaction. End user testing, also known as user acceptance testing (UAT) or beta testing, is the final stage of testing performed by the user or client to determine whether the software can be accepted or not1. End user testing is important for both in-house developed and acquired software packages, as it helps to verify the functionality, usability, performance, and reliability of the system2. End user testing also helps to identify and resolve any defects, errors, or issues that may not have been detected by the developers or vendors3. Therefore, option B is the correct answer. Option A is not correct because end user testing is not eliminated by acquiring a software package. Even though the software package may have been tested by the vendor or supplier, it may still have bugs, compatibility issues, or configuration problems that need to be fixed before deployment4. Option C is not correct because end user testing is not increased by acquiring a software package. The scope and extent of end user testing depend on various factors, such as the complexity, criticality, and customization of the system, and not on whether it is developed in-house or acquired. Option D is not correct because end user testing is not reduced by acquiring a software package. The software package may still require modifications or integrations to suit the specific needs and environment of the organization, and these changes need to be tested by the end users. References: Chapter 4 Methods of Software Acquisition5 What is User Acceptance Testing (UAT): A Complete Guide1 What Is End-to-End Testing? (With How-To and Example)3 How to Evaluate New Software in 5 Steps4 User Acceptance Testing (UAT) in ERP Projects User Acceptance Testing for Packaged Software