Appendix A of the book.

Description

© SidorArt/Shutterstock.

Appendix A
Answer Key

CHAPTER 1 The Need for Information Systems Compliance

1. B  2. Risk-based approach  3. A  4. IT infrastructure  5. D  6. B  7. B  8. C  9. A  10. D  11. B  12. E  13. D  14. C  15. A

CHAPTER 2 Overview of U.S. Compliance Laws

1. A  2. C  3. FALSE  4. A  5. B  6. B  7. C  8. E  9. D  10. A  11. B  12. C  13. True  14. B  15. E  16. B  17. A  18. B  19. C  20. D  21. CIPA

CHAPTER 3 What Is the Scope of an IT Compliance Audit?

1. Gap  2. C  3. A  4. A  5. B  6. C  7. E  8. B  9. D  10. Framework  11. D  12. A, B, and C  13. A, B, and E  14. Identity  15. B  16. FALSE  17. B  18. D  19. B  20. B

CHAPTER 4 Auditing Standards and Frameworks

1. Framework  2. A  3. B  4. A, B, and C  5. B  6. Goal  7. B  8. B  9. B  10. B  11. Practice  12. D  13. A  14. D  15. A, B, and D  16. B  17. A  18. B

CHAPTER 5 Planning an IT Infrastructure Audit for Compliance

1. E  2. C  3. B  4. B  5. C  6. A  7. D  8. C  9. A  10. A  11. E  12. B  13. A  14. C  15. D  16. C  17. A  18. B

CHAPTER 6 Conducting an IT Infrastructure Audit for Compliance

1. A  2. C  3. B  4. B  5. Penetration test  6. A  7. A  8. A  9. D  10. A  11. Management  12. A  13. A  14. A  15. C  16. A  17. C  18. A  19. B  20. B

CHAPTER 7 Writing the IT Infrastructure Audit Report

1. A  2. B  3. B  4. B  5. A  6. B  7. A  8. C  9. A  10. A  11. A  12. D  13. A  14. B  15. B

CHAPTER 8 Compliance Within the User Domain

1. B  2. Business drivers  3. C  4. A  5. Need to know  6. B  7. D  8. B  9. C  10. A  11. C  12. B  13. C  14. B  15. A  16. A  17. A  18. A  19. A  20. Insider

CHAPTER 9 Compliance Within the Workstation Domain

1. Due diligence  2. B  3. B and C  4. War dialing  5. A  6. B  7. B  8. Integrity  9. A and D  10. Worm  11. Management System  12. B  13. A

CHAPTER 10 Compliance Within the LAN Domain

1. B  2. B  3. B  4. Fiber optic  5. A  6. A  7. A  8. B  9. Software or SD-WAN  10. C  11. A  12. Availability  13. B and C  14. B  15. C  16. A  17. LAN  18. A  19. B  20. B

CHAPTER 11 Compliance Within the LAN-to-WAN Domain

1. A  2. A  3. A  4. Demilitarized zone (DMZ)  5. B  6. Single point of failure  7. B and C  8. C  9. B  10. C  11. Virtual private network (VPN)  12. B  13. A  14. Multi-Protocol Label Switching (MPLS)  15. B

CHAPTER 12 Compliance Within the WAN Domain

1. B  2. A  3. B  4. B  5. A  6. Service level agreement (SLA)  7. A  8. C  9. WAN optimizer  10. B  11. B  12. C  13. Incident response  14. 2

CHAPTER 13 Compliance Within the Remote Access Domain

1. B  2. C  3. Encryption  4. B  5. A  6. D  7. A  8. Tunneling  9. B  10. B  11. SNMP  12. A  13. D  14. B  15. B  16. D  17. C  18. A  19. B  20. C

CHAPTER 14 Compliance Within the System/Application Domain

1. B  2. B  3. A  4. Subnet  5. B  6. People  7. B  8. UAT or User Acceptance Testing  9. DLP  10. Web server  11. A  12. A and C  13. B

CHAPTER 15 Ethics, Education, and Certification for IT Auditors

1. A  2. Code  3. B  4. B and C  5. D  6. A  7. D  8. E  9. B  10. E  11. A  12. A  13. D  14. A  15. B  16. A  17. D X

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.135.204.216