ExamGecko
Question list
Search
Search

Related questions

Question 1154 - CISA discussion

Report
Export

In a review of the organization standards and guidelines for IT management, which of the following should be included in an IS development methodology?

A.
Value-added activity analysis
Answers
A.
Value-added activity analysis
B.
Risk management techniques
Answers
B.
Risk management techniques
C.
Access control rules
Answers
C.
Access control rules
D.
Incident management techniques
Answers
D.
Incident management techniques
Suggested answer: B

Explanation:

Risk management techniques should be included in an IS development methodology. An IS development methodology is a set of guidelines, standards, and procedures that provide a structured and consistent approach to developing information systems.A good IS development methodology should cover all the phases of the system development life cycle (SDLC), from planning and analysis to design, implementation, testing, and maintenance1.

Risk management techniques are an essential part of an IS development methodology, as they help to identify, assess, prioritize, mitigate, monitor, and communicate the risks that may affect the success of the system development project.Risk management techniques can also help to ensure that the system meets the requirements and expectations of the stakeholders, complies with the relevant laws and regulations, and delivers value to the organization2.

The other options are not as relevant or appropriate as risk management techniques for an IS development methodology.Value-added activity analysis is a technique for evaluating the efficiency and effectiveness of business processes, but it is not specific to IS development3.Access control rules are policies and mechanisms for restricting or granting access to information systems and resources, but they are more related to security management than IS development4.Incident management techniques are methods for handling and resolving incidents that disrupt the normal operation of information systems and services, but they are more related to service management than IS development5.

ISACA, CISA Review Manual, 27th Edition, 2019, p.1911

ISACA, CISA Review Manual, 27th Edition, 2019, p.1942

Value-Added Activity Analysis3

Access Control Rules4

Incident Management Techniques5

asked 18/09/2024
Julio Callegaro
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first