Due in 1 hour, all answers must be correct

Question 1

Which type of audit is performed primarily as a result of suspicious activity or alleged violations?

Don't use plagiarized sources. Get Your Custom Essay on
Due in 1 hour, all answers must be correct
Just from $13/Page
Order Essay

[removed]

 

IT audit

[removed]

 

Investigative audit

[removed]

 

Compliance audit

[removed]

 

Operational audit

 

 

Question 2

Which of the following is the definition of Control Objectives for Information and related Technology (COBIT)?

[removed]

 

Oversight agencies that deal with administrative law, codifying, and enforcing rules.

[removed]

 

The act of adhering to internal policies, as well as applicable laws, regulations, and industry requirements.

[removed]

 

A framework providing best practices for IT governance and control.

[removed]

 

An organization with the mission of promoting innovation and competitiveness through the advancement of science, standards, and technology to improve economic security and quality of life.

 

 

Question 3

A large organization’s enterprise resource planning (ERP) system is being audited. Which of the following auditing scopes is most likely to apply?

[removed]

 

Organizational

[removed]

 

Compliance

[removed]

 

Application

[removed]

 

Technical

 

 

Question 4

___________ represents the controls that protect and defend information and information systems by ensuring confidentiality, integrity, and availability.

[removed]

 

Information assurance

[removed]

 

Certification and accreditation

[removed]

 

Information resource management

[removed]

 

Integrity

 

Question 5

The results of annual FISMA evaluations are sent to which U.S. federal agency?

[removed]

 

Executive Office of the President

[removed]

 

Government Accountability Office (GAO)

[removed]

 

General Services Administration (GSA)

[removed]

 

Office of Management and Budget (OMB)

 

 

Question 6

What is meant by compliance?

[removed]

 

Assurance that information is not disclosed to unauthorized sources.

[removed]

 

The act of adhering to internal policies, as well as applicable laws, regulations, and industry requirements.

[removed]

 

An audit of federal systems prior to being placed into a production environment.

[removed]

 

Protection of the confidentiality, integrity, and availability of data, and providing for authentication and nonrepudiation of services.

 

 

Question 7

By having sound policies in place and a framework for the application of controls, you will be able to map existing controls to each regulation, including future regulations. Thereafter, organizations perform a __________ to identify anything that is missing.

[removed]

 

gap analysis

[removed]

 

risk analysis

[removed]

 

risk assessment

[removed]

 

policy analysis

 

 

Question 8

Backup procedures for a server would be found in the _______ Domain.

[removed]

 

User

[removed]

 

Workstation

[removed]

 

LAN

[removed]

 

Remote Access

 

 

Question 9

The end users’ operating environment is called the _____________.

[removed]

 

User Domain

[removed]

 

Workstation Domain

[removed]

 

LAN Domain

[removed]

 

All options are correct

 

Question 10

Which of the following is not a characteristic of an IT security framework?

[removed]

 

Is a conceptual set of rules and ideas that provides structure to a complex situation

[removed]

 

Is rigid in structure and content

[removed]

 

Provides a consistent system of controls to which IT departments can adhere

[removed]

 

Provides an auditor a consistent approach for conducting audits

 

 

Question 11

What term is used to describe measures to be applied to a system that are high level and provide a lot of flexibility?

[removed]

 

Descriptive control

[removed]

 

Prescriptive control

[removed]

 

NIST 800-53A

[removed]

 

Control objectives

 

 

Question 12

What term is used to describe an audit that combines the assessment of financial reporting along with the assessment of related IT controls?

[removed]

 

ISO/IEC 27001

[removed]

 

Integrated audit

[removed]

 

Auditing Standard No. 5

[removed]

 

NIST 800-53A

 

Calculator

Calculate the price of your paper

Total price:$26
Our features

We've got everything to become your favourite writing service

Need a better grade?
We've got you covered.

Order your paper