Which auditing scopes is most likely to apply

Assignment Help Computer Engineering
Reference no: EM131271987

Question 1
Which type of audit is performed primarily as a result of suspicious activity or alleged violations?
IT audit
Investigative audit
Compliance audit
Operational audit

Question 2
Which of the following is the definition of Control Objectives for Information and related Technology (COBIT)?
Oversight agencies that deal with administrative law, codifying, and enforcing rules.
The act of adhering to internal policies, as well as applicable laws, regulations, and industry requirements.
A framework providing best practices for IT governance and control.
An organization with the mission of promoting innovation and competitiveness through the advancement of science, standards, and technology to improve economic security and quality of life.

Question 3
A large organization's enterprise resource planning (ERP) system is being audited. Which of the following auditing scopes is most likely to apply?
Organizational
Compliance
Application
Technical

Question 4
___________ represents the controls that protect and defend information and information systems by ensuring con?dentiality, integrity, and availability.
Information assurance
Certi?cation and accreditation
Information resource management
Integrity

Question 5
The results of annual FISMA evaluations are sent to which U.S. federal agency?
Executive Office of the President
Government Accountability Office (GAO)
General Services Administration (GSA)
Office of Management and Budget (OMB)

Question 6
What is meant by compliance?
Assurance that information is not disclosed to unauthorized sources.
The act of adhering to internal policies, as well as applicable laws, regulations, and industry requirements.
An audit of federal systems prior to being placed into a production environment.
Protection of the confidentiality, integrity, and availability of data, and providing for authentication and nonrepudiation of services.

Question 7
By having sound policies in place and a framework for the application of controls, you will be able to map existing controls to each regulation, including future regulations. Thereafter, organizations perform a __________ to identify anything that is missing.
gap analysis
risk analysis
risk assessment
policy analysis

Question 8
Backup procedures for a server would be found in the _______ Domain.
User
Workstation
LAN
Remote Access

Question 9
The end users' operating environment is called the _____________.
User Domain
Workstation Domain
LAN Domain
All options are correct

Question 10
Which of the following is not a characteristic of an IT security framework?
Is a conceptual set of rules and ideas that provides structure to a complex situation
Is rigid in structure and content
Provides a consistent system of controls to which IT departments can adhere
Provides an auditor a consistent approach for conducting audits

Question 11
What term is used to describe measures to be applied to a system that are high level and provide a lot of flexibility?
Descriptive control
Prescriptive control
NIST 800-53A
Control objectives

Question 12
What term is used to describe an audit that combines the assessment of financial reporting along with the assessment of related IT controls?
ISO/IEC 27001
Integrated audit
Auditing Standard No. 5
NIST 800-53A

Reference no: EM131271987

Questions Cloud

What is the overhead associated with this µ : What value of µ is needed for the prefix to eliminate ISI between vector code words? What is the overhead associated with this µ?
What do you think would be possible solutions : What do you think are some possibilities for the cause of the problem? If making assumptions, please state what those assumptions are. What do you think would be possible solutions?
What maximum and minimum data rates could be achieved : Find the data rate of an 802.11a system assuming half the available 48 subchannels use BPSK with a rate-1/2 channel code and the others use 64-QAM with a rate-3/4 channel code.
Maximum of three integers : You will have a main module and a function named max that accepts three integer values as arguments. The max function should return the value that is greater of the three. For example, if 7,12 and 9 are passed as arguments to the function, the fun..
Which auditing scopes is most likely to apply : A large organization's enterprise resource planning (ERP) system is being audited. Which of the following auditing scopes is most likely to apply?
Microsoft threat modeling tool : Conduct a threat analysis on Wal Mart using the Microsoft® Threat Modeling Tool. NOTE: MUST USE MICROSOFT THREAT MODELING TOOL
What is generally not tracked in change management database : What is generally not tracked in a change management database? When performing a security assessment, using a framework such as NIST 800-15, which is generally the first step?
Find the sum-rate capacity for a two-user broadcast fading : Find the sum-rate capacity for a two-user broadcast fading channel where each user experiences Rayleigh fading. Assume an average received power of P = 10 mW for each user, bandwidth B = 100 kHz, and N0 = 10-9 W/Hz.
Indentical insulators of self-capacitance : Each line of a 3-phase system is suspended by a string of 3 indentical insulators of self-capacitance C farad. The shunt capacitance of connecting metal work of each insulator is 0·2 C to earth and 0·1 C to line.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd