Reference no: EM131271987
Question 1
Which type of audit is performed primarily as a result of suspicious activity or alleged violations?
IT audit
Investigative audit
Compliance audit
Operational audit
Question 2
Which of the following is the definition of Control Objectives for Information and related Technology (COBIT)?
Oversight agencies that deal with administrative law, codifying, and enforcing rules.
The act of adhering to internal policies, as well as applicable laws, regulations, and industry requirements.
A framework providing best practices for IT governance and control.
An organization with the mission of promoting innovation and competitiveness through the advancement of science, standards, and technology to improve economic security and quality of life.
Question 3
A large organization's enterprise resource planning (ERP) system is being audited. Which of the following auditing scopes is most likely to apply?
Organizational
Compliance
Application
Technical
Question 4
___________ represents the controls that protect and defend information and information systems by ensuring con?dentiality, integrity, and availability.
Information assurance
Certi?cation and accreditation
Information resource management
Integrity
Question 5
The results of annual FISMA evaluations are sent to which U.S. federal agency?
Executive Office of the President
Government Accountability Office (GAO)
General Services Administration (GSA)
Office of Management and Budget (OMB)
Question 6
What is meant by compliance?
Assurance that information is not disclosed to unauthorized sources.
The act of adhering to internal policies, as well as applicable laws, regulations, and industry requirements.
An audit of federal systems prior to being placed into a production environment.
Protection of the confidentiality, integrity, and availability of data, and providing for authentication and nonrepudiation of services.
Question 7
By having sound policies in place and a framework for the application of controls, you will be able to map existing controls to each regulation, including future regulations. Thereafter, organizations perform a __________ to identify anything that is missing.
gap analysis
risk analysis
risk assessment
policy analysis
Question 8
Backup procedures for a server would be found in the _______ Domain.
User
Workstation
LAN
Remote Access
Question 9
The end users' operating environment is called the _____________.
User Domain
Workstation Domain
LAN Domain
All options are correct
Question 10
Which of the following is not a characteristic of an IT security framework?
Is a conceptual set of rules and ideas that provides structure to a complex situation
Is rigid in structure and content
Provides a consistent system of controls to which IT departments can adhere
Provides an auditor a consistent approach for conducting audits
Question 11
What term is used to describe measures to be applied to a system that are high level and provide a lot of flexibility?
Descriptive control
Prescriptive control
NIST 800-53A
Control objectives
Question 12
What term is used to describe an audit that combines the assessment of financial reporting along with the assessment of related IT controls?
ISO/IEC 27001
Integrated audit
Auditing Standard No. 5
NIST 800-53A
What is the overhead associated with this µ
: What value of µ is needed for the prefix to eliminate ISI between vector code words? What is the overhead associated with this µ?
|
What do you think would be possible solutions
: What do you think are some possibilities for the cause of the problem? If making assumptions, please state what those assumptions are. What do you think would be possible solutions?
|
What maximum and minimum data rates could be achieved
: Find the data rate of an 802.11a system assuming half the available 48 subchannels use BPSK with a rate-1/2 channel code and the others use 64-QAM with a rate-3/4 channel code.
|
Maximum of three integers
: You will have a main module and a function named max that accepts three integer values as arguments. The max function should return the value that is greater of the three. For example, if 7,12 and 9 are passed as arguments to the function, the fun..
|
Which auditing scopes is most likely to apply
: A large organization's enterprise resource planning (ERP) system is being audited. Which of the following auditing scopes is most likely to apply?
|
Microsoft threat modeling tool
: Conduct a threat analysis on Wal Mart using the Microsoft® Threat Modeling Tool. NOTE: MUST USE MICROSOFT THREAT MODELING TOOL
|
What is generally not tracked in change management database
: What is generally not tracked in a change management database? When performing a security assessment, using a framework such as NIST 800-15, which is generally the first step?
|
Find the sum-rate capacity for a two-user broadcast fading
: Find the sum-rate capacity for a two-user broadcast fading channel where each user experiences Rayleigh fading. Assume an average received power of P = 10 mW for each user, bandwidth B = 100 kHz, and N0 = 10-9 W/Hz.
|
Indentical insulators of self-capacitance
: Each line of a 3-phase system is suspended by a string of 3 indentical insulators of self-capacitance C farad. The shunt capacitance of connecting metal work of each insulator is 0·2 C to earth and 0·1 C to line.
|