What is generally not tracked in change management database

Assignment Help Computer Engineering
Reference no: EM131271985

Question 1
Of the following frameworks available from ISACA, which one governs IT investments?
Val IT
Risk IT
IT Assurance Framework

Question 2
Applying controls is a direct result of the risk assessment process combined with an analysis of the tradeoffs. Which one of the following is a tradeoff?
Operational impact
Security impact
User impact
Policy impact

Question 3
Applying controls to a system helps eliminate or reduce the risks. In many cases, the goal is not to eliminate the risk but to reduce the risk to an acceptable level. Why? Applying controls is a direct result of the risk assessment process combined with an analysis of ___________.
the benefits
the tradeoffs

Question 4
The governing process for managing risks and opportunities is the definition of:
NIST Internal Reports (NISTIR)
Consensus Audit Guidelines (CAG)
Generally Accepted Privacy Principles (GAPP)
Enterprise risk management (ERM)

Question 5
Analyzing potential threats requires the identification of all possible threats first. This is called __________.
threat identification
policy identification
risk identification
risk analysis

Question 6
During an IT audit, which of the following administrative safeguards needs to be tested and validated?
Assignment of responsibilities
Maintenance procedures
Rotation of duties
All of the above

Question 7
When performing a security assessment, using a framework such as NIST 800-15, which is generally the first step?
Target identification
Document review
Target analysis
Exploit and validate vulnerabilities

Question 8
What is generally not tracked in a change management database?
Operating system type
Cost of software
Hardware configuration
Access permissions

Question 9
What is an example of multifactor authentication?
A fingerprint reader
A smart card with a PIN
A password
An acceptable use policy

Question 10
Of the four elements of an audit finding, which one identifies the expected or desired state, which provides context for evaluating the evidence collected by the auditor and the subsequent procedures the auditor performs?

Question 11
For security controls, gap analysis involves comparing the present state of controls with a desired state of controls. At a minimum, common baseline security controls should be in place. Any gaps to various types of controls should be clearly documented, for example - "Business continuity management", which:
Defines the program to provide initial and ongoing security education across the organization.
Defines how staff will execute upon the policies, assign responsibilities, and promote accountability.
Prevents errors and unauthorized misuse of applications.
Provides methods to continue critical operations in spite of business interruptions.

Question 12
Which element does not constitute an audit finding?

Question 13
During an IT audit of a social networking site, the auditor finds that users do not have the option to opt out of a new program to share portions of users' profiles automatically. Which privacy principle is most affected?
Choice and consent
Monitoring and enforcement

Reference no: EM131271985

Give the highest test score and the name of the students

I need a C++ program that reads students' names followed by their test scores. The program should output each student's name followed by the test scores and the relevant gra

Write application that instantiates five librarybook objects

Write an application that instantiates five LibraryBook objects and prompts the user for values for the data fields. The objects should be stored in either an Array or an A

Show what is the current size of s

Consider an initially empty stack S has performed a total of 25 push operations, 12 top operations, and 10 pop operations, 3 of which generated EmptyStackExceptions, which w

What is the goal to exercises in the bluej textbook

What is the goal to exercises in the BlueJ textbook? For the remains of the course, you will answer the questions posed by BlueJ textbook-you will not require downloading

Describe about quantum computing

Quantum computing is the latest technological concept in information processing. Your imaginings and musings about where technology may take us after quantum-based computing

Identify threats for which a matching vulnerability exists

The Assignment Using the NIST Special Publication 800-30, complete a Risk Assessment to identify potential threats for which a matching vulnerability exists in the above des

Make ajax programming based solutions to write a code

In the AJAX scripts you create, refer to the DSN datasource as flamingo. although its not in your own folder or directory, it has been set up as a SYSTEM DSN, so your AJAX sc

How to produce a data model segment

Some mechanics are specialized in engine (EN) maintenance. Some mechanics are specialized in the airframe (AF) maintenance. Some mechanics are specialized in avionics (AV) m


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd