Question 161

Hamid needs to shift users from using the application from the existing (Old) system to the replacing (new)
system. His manager Lily has suggested he uses an approach in which the newer system is changed over
from the older system on a cutoff date and time and the older system is discontinued once the changeover
to the new system takes place. Which of the following changeover approach is suggested by Lily?
  • Question 162

    Fourth-Generation Languages (4GLs) are most appropriate for designing the application's graphical user interface (GUI). They are inappropriate for designing any intensive data- calculation procedures. True or false?
  • Question 163

    Which of the following should an IS auditor review to determine user permissions that have been granted
    for a particular resource?
  • Question 164

    Requiring that passwords contain a combination of numeric and alphabetic characters is MOST effective against which type of attack?
  • Question 165

    An IS auditor observed a lack of compliance with a documented control and rated the noncompliance as a high-risk finding. The auditee has challenged the rating, stating the noncompliance is low-risk. Which of the following is the auditor's BEST course of action?