Which two of the following are examples of audit methods that 'do' involve human interaction?

Which two of the following are examples of audit methods that 'do' involve human interaction?A . Performing an independent review of procedures in preparation for an auditB . Reviewing the auditee's response to an audit findingC . Analysing data by remotely accessing the auditee's serverD . Observing work performed by...

February 7, 2025 No Comments READ MORE +

To complete the sentence with the word(s) click on the blank section you want to complete so that it is highlighted in red, and then click on the application text from the options below. Alternatively, you may drag and drop the option to the appropriate blank section

DRAG DROP Select a word from the following options that best completes the sentence: To complete the sentence with the word(s) click on the blank section you want to complete so that it is highlighted in red, and then click on the application text from the options below. Alternatively, you...

February 7, 2025 No Comments READ MORE +

During discussions with the individual(s) managing the audit programme of a certification body, the Management System Representative of the client organisation asks for a specific auditor for the certification audit. Select two of the following options for how the individual(s) managing the audit programme should respond.

During discussions with the individual(s) managing the audit programme of a certification body, the Management System Representative of the client organisation asks for a specific auditor for the certification audit. Select two of the following options for how the individual(s) managing the audit programme should respond.A . Advise the Management...

February 7, 2025 No Comments READ MORE +

The following are purposes of Information Security, except:

The following are purposes of Information Security, except:A . Ensure Business ContinuityB . Minimize Business RiskC . Increase Business AssetsD . Maximize Return on InvestmentView AnswerAnswer: C Explanation: The following are purposes of information security, except increasing business assets. Increasing business assets is not a purpose of information security, as...

February 6, 2025 No Comments READ MORE +

Which four of the following constitute 'internal' issues in the context of a management system to ISO 27001:2022?

During a third-party certification audit, you are presented with a list of issues by an auditee. Which four of the following constitute 'internal' issues in the context of a management system to ISO 27001:2022?A . Higher labour costs as a result of an aging populationB . A rise in interest...

February 5, 2025 No Comments READ MORE +

In acceptable use of Information Assets, which is the best practice?

In acceptable use of Information Assets, which is the best practice? A. Access to information and communication systems are provided for business purpose only B. Interfering with or denying service to any user other than the employee's host C. Playing any computer games during office hours D. Accessing phone or...

February 5, 2025 No Comments READ MORE +

Which two of the following issues would you need to inform the auditee about before you start conducting the audit?

You have to carry out a third-party virtual audit. Which two of the following issues would you need to inform the auditee about before you start conducting the audit?A . You will ask to see the ID card of the person that is on the screen.B . You will take...

February 4, 2025 No Comments READ MORE +

The audit lifecycle describes the ISO 19011 process for conducting an individual audit

DRAG DROP The audit lifecycle describes the ISO 19011 process for conducting an individual audit. Drag and drop the steps of the audit lifecycle into the correct sequence. View AnswerAnswer: Explanation: The correct sequence of the steps of the audit lifecycle according to ISO 19011:2018 is: Step 1: Audit initiation...

February 3, 2025 No Comments READ MORE +

-------------------------is an asset like other important business assets has value to an organization and consequently needs to be protected.

-------------------------is an asset like other important business assets has value to an organization and consequently needs to be protected.A . InfrastructureB . DataC . InformationD . SecurityView AnswerAnswer: C Explanation: Information is an asset like other important business assets, as it has value to an organization and consequently needs to...

January 31, 2025 No Comments READ MORE +

What does this signify?

You see a blue color sticker on certain physical assets. What does this signify?A . The asset is very high critical and its failure affects the entire organizationB . The asset with blue stickers should be kept air conditioned at all timesC . The asset is high critical and its...

January 30, 2025 No Comments READ MORE +