Profile cover photo
Profile photo
Ransom Warri
28 followers
28 followers
About
Ransom's posts

Post has attachment
I recently received a message from one of my friends studying towards his CISA exams and he wanted to know the difference between data integrity, confidentiality, currency and availability. Here is a classic CISA question that deals with all of these…

Post has attachment
I have written a question that usually confuses CISA exam students regarding access control. If you are not from an IT background, this question may appear very confusing to you as well. Ransom’s Question on 19/03/2017 – User Access Review An IS auditor…

Post has attachment
The Project development life cycle is something that most CISA students struggle with. I have developed a question below that will help you in understanding this concept. Ransom’s Question on 19/03/2017 – Project Development life cycle During a project…

Post has attachment
Most CISA candidates struggle with questions related to information assets protection. I have prepared a question below that will help you understand this concept. Ransom’s Question on 12/03/2017 – Information Asset Protection Why do digital signatures…

Post has attachment
Understanding the differences between system worms, viruses and trojan horses is crucial in responding to CISA questions. Here is a typical example of a question regarding worms, viruses and trojan horses. Ransom’s Question on 18/02/2017 – Asset…

Post has attachment
Understanding the differences between system worms, viruses and trojan horses is crucial in responding to CISA questions. Here is a typical example of a question regarding worms, viruses and trojan horses. Ransom’s Question on 18/02/2017 – Asset…

Post has attachment
Understanding the differences between system worms, viruses and trojan horses is crucial in responding to CISA questions. Here is a typical example of a question regarding worms, viruses and trojan horses. Ransom’s Question on 18/02/2017 – Asset…

Post has attachment
Ransom’s Question on 12/02/2017 – Part 3 What is the main advantage of developing an application by using the prototype model or approach? A  –  It is less expensive since documents are available. B  –  The application can be used across numerous…

Post has attachment
Ransom’s Question on 11/02/2017 Which if the following is NOT a good reason for an organisation to stop outsourcing its activities and bring it in-house? A  –  The company is currently suffering a financial loss. B  –  The competitor recently brought…

Post has attachment
Ransom’s Question on 01/02/2017 What is the main difference between Object Oriented Database (OODB) and Data Oriented Database (DODB)? Object Oriented Database (DODB) is for clearly defined data with fixed lengths and widths while Data Oriented Database…
Wait while more posts are being loaded