Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question 1
Of the following frameworks available from ISACA, which one governs IT investments?
COBIT
Val IT
Risk IT
IT Assurance Framework

Question 2
Applying controls is a direct result of the risk assessment process combined with an analysis of the tradeoffs. Which one of the following is a tradeoff?
Operational impact
Security impact
User impact
Policy impact

Question 3
Applying controls to a system helps eliminate or reduce the risks. In many cases, the goal is not to eliminate the risk but to reduce the risk to an acceptable level. Why? Applying controls is a direct result of the risk assessment process combined with an analysis of ___________.
the benefits
management
the tradeoffs
resources

Question 4
The governing process for managing risks and opportunities is the definition of:
NIST Internal Reports (NISTIR)
Consensus Audit Guidelines (CAG)
Generally Accepted Privacy Principles (GAPP)
Enterprise risk management (ERM)

Question 5
Analyzing potential threats requires the identification of all possible threats first. This is called __________.
threat identification
policy identification
risk identification
risk analysis

Question 6
During an IT audit, which of the following administrative safeguards needs to be tested and validated?
Assignment of responsibilities
Maintenance procedures
Rotation of duties
All of the above

Question 7
When performing a security assessment, using a framework such as NIST 800-15, which is generally the first step?
Target identification
Document review
Target analysis
Exploit and validate vulnerabilities

Question 8
What is generally not tracked in a change management database?
Operating system type
Cost of software
Hardware configuration
Access permissions

Question 9
What is an example of multifactor authentication?
A fingerprint reader
A smart card with a PIN
A password
An acceptable use policy

Question 10
Of the four elements of an audit finding, which one identifies the expected or desired state, which provides context for evaluating the evidence collected by the auditor and the subsequent procedures the auditor performs?
Criteria
Circumstance
Cause
Impact

Question 11
For security controls, gap analysis involves comparing the present state of controls with a desired state of controls. At a minimum, common baseline security controls should be in place. Any gaps to various types of controls should be clearly documented, for example - "Business continuity management", which:
Defines the program to provide initial and ongoing security education across the organization.
Defines how staff will execute upon the policies, assign responsibilities, and promote accountability.
Prevents errors and unauthorized misuse of applications.
Provides methods to continue critical operations in spite of business interruptions.

Question 12
Which element does not constitute an audit finding?
Criteria
Circumstance
Summary
Impact

Question 13
During an IT audit of a social networking site, the auditor finds that users do not have the option to opt out of a new program to share portions of users' profiles automatically. Which privacy principle is most affected?
Choice and consent
Notice
Monitoring and enforcement
Quality

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92026712
  • Price:- $15

Priced at Now at $15, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Suppose a bowl has 5 chips 2 chips labeled 2 and 3 chips

Suppose a bowl has 5 chips; 2 chips labeled "2" and 3 chips labeled "3". Suppose 2 chips are selected at random without replacement. Let random variable X equal the product of the two draws (e.g. if the first draw is a 2 ...

Question you will submit a business case proposal which is

Question: You will submit a Business Case Proposal, which is a summary of your selected business case for the course project. The business case proposal will be submitted as a Word document and in paragraph form. This bu ...

Systems and networksconsider communication between a sender

(Systems and Networks) Consider communication between a sender and receiver. Using a time-space diagram, illustrate reliable transmission of a message consisting of 5 segments using the selective-repeat protocol with N=3 ...

Question suppose that in addition to edge capacities a flow

Question : Suppose that, in addition to edge capacities, a flow network has vertex capacities. That is each vertex v has a limit l(v) on how much flow can pass through v. Show how to transform a flow network G = (V, E) w ...

Nfs allows the file system on one linux computer to be

NFS allows the file system on one Linux computer to be accessed over a network connection by another Linux system. Discuss the security vulnerabilities of NFS in networked Linux systems, and possible mitigation solutions ...

Explain the difference between penetration tests and

Explain the difference between penetration tests and security tests. Emphasize that this book will explain things from a security testing perspective.

Explain how financial leverage at investment banks differed

Explain how financial leverage at investment banks differed from financial leverage at more traditional commercial banks. What is the benefits of this leverage? What are the primary risks associated with financial levera ...

Task create an array that holds 100000 random integers

Task : Create an array that holds 100000 random integers between 1-100000. Allow the user to enter an integer to search. Create and implement modified bubble sort algorithm which will sort the array before the Binary Sea ...

A street vendor is asking people to play a simple game you

A street vendor is asking people to play a simple game. You roll a pair of dice. If the sum on the dice is 10 or higher, you win $10. If you roll a pair of 1's, you win $59. Otherwise you lose $5. If the random variable ...

Question suppose a computer using set associative cache has

Question : Suppose a computer using set associative cache has 2^16 words of main memory and a cache of 128 blocks, and each cache block contains 8 words. Show steps, please type. a. If this cache is 2-way set associative ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As