90 SURGENT MCQS Flashcards

1
Q

A company is considering a move to a software as a service (SaaS) offering instead of a traditional in-house application. Which of the following concerns is unique to SaaS?

Disaster recovery capabilities and documented recovery procedures

User credential setup and control over the actions that employees can perform

Allocation of software expenses and overhead charged to departments

Ownership of processed data and costs of data migrations

A

Ownership of processed data and costs of data migrations

In a software as a service (SaaS) model, the company relies on a third-party provider’s infrastructure to host and process its data. This raises unique concerns about the ownership of the processed data since it resides on the SaaS provider’s servers. Additionally, costs associated with migrating data to and from the SaaS offering are critical considerations, as data migrations may incur expenses and require careful planning.

Disaster recovery capabilities and documented recovery procedures

Disaster recovery is a shared concern for in-house applications and SaaS offerings. Both models need robust recovery capabilities to ensure business continuity during a disaster. It is not unique to SaaS and is a standard consideration for any critical IT infrastructure.

User credential setup and control over the actions that employees can perform

User credential setup and access control are general concerns applicable to any IT environment, whether in-house or SaaS-based. Both models require managing user access and control permissions, making this concern not unique to SaaS.

Allocation of software expenses and overhead charged to departments

Allocating software expenses and managing overhead costs is a common consideration for both in-house applications and SaaS offerings. Organizations must understand the cost structure and budgeting for their software solutions, making this concern not unique to SaaS.

Cloud Computing

Relevant Terms
Cloud
Data
Software
Software as a Service (SaaS)

Reference
7111.08

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A fintech (financial technology) organization plans to deploy a cloud-based application for employee payroll processing. Which of the following should be the most significant concern for an auditor?

Performance requirements are not specified in the service-level agreement (SLA).

There is no right-to-audit clause in the contract.

The contract does not require the cloud provider to provide its annual penetration testing results.

The cloud provider’s data center is located in a different country.

A

The cloud provider’s data center is located in a different country.

Data protection regulations are the most important risk to consider due to data residency where different countries have specific regulations about where data can be stored and processed. Depending on your application and its data, you may also need to comply with various data protection laws, such as GDPR, HIPAA, or CCPA. The risks related to not complying can be costly because you can be fined for data breaches.

Performance requirements are not specified in the service-level agreement (SLA).

Service Level Agreements (SLA) related to cloud service providers are formal contracts that outline the performance standards, quality of service, and responsibilities between the cloud service provider and the customer. These agreements define specific metrics related to the service’s performance, availability, and reliability that the provider commits to meet. SLAs are crucial in the cloud computing environment as they offer customers a guarantee regarding the level of service they can expect and provide recourse in case the service levels are not achieved. They are very important, but they do not involve the severity of fines that not complying with laws and regulations result in.

There is no right-to-audit clause in the contract.

A right-to-audit clause in a Service Level Agreement (SLA) is a provision that grants the customer the right to conduct audits on the service provider’s processes, systems, and operations relevant to the services provided under the agreement. This clause is designed to ensure transparency and compliance with the terms of the SLA, allowing the customer to verify that the service provider is fulfilling their obligations, particularly in areas such as performance, security, data protection, and privacy. Again, the possibility of breaking laws and regulations and being fined is more important.

The contract does not require the cloud provider to provide its annual penetration testing results.

Penetration testing by a cloud service provider involves a systematic attempt to evaluate the security of their cloud services by simulating an attack from malicious outsiders (and sometimes insiders). This type of testing is designed to identify vulnerabilities, weaknesses, and potential security gaps within the cloud infrastructure, including hardware, software, networks, and applications. The primary goal is to discover and fix security issues before they can be exploited by attackers, thereby enhancing the overall security posture of the cloud services offered to customers.

Penetration testing in the cloud environment can be more complex than in traditional IT environments due to the shared responsibility model that underpins cloud computing. In this model, the cloud service provider is responsible for securing the infrastructure (hardware, software, networking, and facilities), while the customer is responsible for securing the data and applications they run within the cloud. This division of responsibility means that penetration testing must be carefully planned and coordinated to ensure it does not impact other tenants or violate the cloud provider’s terms of service. Penetration testing is important, but the risk of fines is more important of a consideration.

Cloud Computing

Relevant Terms
Cloud
Cloud Computing

Reference
7111.11
7111.13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A healthcare provider is considering moving its data storage to the cloud. What is the most critical consideration for the healthcare provider?

The backup method used by the cloud provider

The cost of storing in the cloud versus on-premises

The cloud provider’s reputation in the market

Regulatory and compliance requirements

A

Regulatory and compliance requirements. HIPAA is a huge concern for healthcare providers. There are heavy fines for noncompliance with HIPAA.

  • Regulatory compliance:
    1. Data protection laws: Adhering to data protection regulations such as GDPR (General Data Protection Regulation) and HIPAA (Health Insurance Portability and Accountability Act of 1996)
  • Legal documentation:
    1. Service-level agreements (SLAs): Clearly defining service levels, responsibilities, and customer rights in legal documents.
    2. Privacy policies: Outlining how customer data is handled, used, and protected

The backup method used by the cloud provider.

This is not as critical as regulatory compliance.

The cost of storing in the cloud versus on-premises.

This is not as critical as regulatory compliance.

The cloud provider’s reputation in the market.

This is not as critical as regulatory compliance.

Cloud Computing

What is the most critical factor in a decision for a health provider when considering moving their data to the cloud?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ABC Cloud sells software to watch licensed videos on demand. It follows a subscription-based model whereby the user chooses a subscription plan and pays a fixed sum of money to ABC Cloud monthly or annually. What type of cloud-based service is ABC Cloud providing?

Windows Azure

IaaS

PaaS

SaaS

A

SaaS

ABC Cloud is providing software as a service (SaaS). Software as a service (SaaS) is software that can be accessed via an internet browser without downloading it onto a computer, laptop, or smartphone. SaaS usually comes as a subscription-based service where the user pays a fixed monthly or annually for using the software. The user’s data is kept in the SaaS provider’s data center. Software as a service (SaaS) provides on‐demand online access to specific software applications or suites without the need for local installation. SaaS can be implemented as a subscription service (for example, Microsoft Office 365).

IaaS

IaaS (infrastructure as a service), the consumer is provided with fundamental computing resources such as processing power, storage, networking components, or middleware. The consumer can control the operating system, storage, deployed applications, and possibly networking components such as firewalls and load balancers, but not the cloud infrastructure beneath them.

PaaS

PaaS (platform as a service) provides consumers a hosting environment for their applications. The consumer controls the applications that run in the environment but does not control the software, hardware, or network infrastructure on which they are running.

Windows Azure

Microsoft’s Windows Azure is IaaS (infrastructure as a service) and PaaS (platform as a service).

Cloud Computing

Relevant Terms
Cloud Computing
Software as a Service (SaaS)

Reference
7111.08

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Amanda, an auditor, is reviewing an organization’s agreement with a cloud provider. Which of the following is the most significant concern for Amanda?

The contract prohibits site visits.

Laws and regulations are different in the countries of the organization and the vendor.

The organization uses an older web browser that is highly vulnerable to cyberattacks.

The contract does not state the cloud provider’s responsibility in the event of a data breach.

A

The contract does not state the cloud provider’s responsibility in the event of a data breach.

Cloud computing involves more than one party, and each party is responsible for maintaining adequate security in their respective IT environments. In the event of a security breach, the party responsible for the breach should be held accountable. Therefore, the contract should state the responsibilities of each party in the case of a data incident.

CHATGPT:
Data Breach Responsibilities: Understanding and clearly defining the responsibilities of each party in the event of a data breach is crucial for managing risk. Without explicit terms regarding the cloud provider’s obligations, the organization may be left vulnerable to significant legal, financial, and reputational damage without recourse or support from the provider.

Compliance and Regulatory Implications: Many industries are subject to strict regulations regarding data protection and breach notification (e.g., GDPR, HIPAA). Failure to ensure that the cloud provider adheres to these regulations can result in hefty fines and penalties for non-compliance. The absence of clear responsibilities in the contract can complicate compliance efforts.

Risk Management: A contract that clearly outlines the provider’s responsibilities is essential for effective risk management. Without this, the organization might not have adequate measures in place to mitigate the impact of a data breach, including incident response, notification processes, and remediation efforts.

While the other concerns are also important—such as the security risks associated with using outdated software, differences in legal jurisdictions, and the prohibition of site visits—the lack of clarity around the cloud provider’s responsibilities in a data breach scenario poses a direct threat to the organization’s security posture and compliance status. It affects the organization’s ability to respond effectively to incidents and manage its overall risk profile.

The contract prohibits site visits.

While site visits act as a helpful oversight and monitoring control, there are alternative procedures to monitor cloud providers such as virtual meetings and performance monitoring reports.

Prohibiting site visits to the cloud provider’s facilities may raise concerns about transparency and the ability to conduct thorough audits of physical and operational security measures. However, many cloud services operate on models that do not easily accommodate physical audits due to the distributed nature of cloud computing. Instead, reliance on third-party certifications and audits (e.g., SOC 2, ISO 27001) can mitigate these concerns. Thus, while this restriction can be a concern, it’s often navigable through other means of assurance.

Laws and regulations are different in the countries of the organization and the vendor.

The auditor should ensure that the contract addresses the differing laws and regulations in the countries of the organization and the vendor, but having different laws and regulations is not a problem.

Differences in laws and regulations across jurisdictions are a common challenge in international business and cloud services. These differences necessitate careful consideration during contract negotiations to ensure compliance with relevant laws in both jurisdictions. However, this issue is not unique to cloud services and can be addressed through legal counsel and compliance efforts, making it a manageable aspect of vendor selection and contract negotiation.

The organization uses an older web browser that is highly vulnerable to cyberattacks.

While highly vulnerable browsers pose a significant risk to the organization’s security, the IS auditor can raise an audit issue for this problem, and IT can acquire and deploy a more secure browser.

Using outdated software that is vulnerable to cyberattacks is indeed a significant security risk. However, this concern is more related to the organization’s internal IT management and cybersecurity practices rather than the specifics of the cloud service provider’s responsibilities. It’s a problem that the organization has direct control over and can remedy by updating or replacing the vulnerable software, thereby mitigating this risk independently of the cloud provider.

Cloud Computing

7221.55
7221.56

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An auditor identified personal software installed on some corporate computers. What should the auditor do next?

Review security training content to determine whether end users are educated on the risks of installing personal software on corporate computers.

Determine whether end users obtained approval from IT before installing personal software on corporate computers.

Report a finding and recommend that IT implement logical controls to disable installation of any personal software.

Review the security policy to determine whether installation of personal software is forbidden on corporate computers.

A

IReview the security policy to determine whether installation of personal software is forbidden on corporate computers.

If the security policy is silent on installing personal software on corporate computers, the auditor should recommend that management update the security policy.

The other answer choices are incorrect. Although these are valid steps that the auditor should take, these should be conducted after the auditor has reviewed the security policy.

IT Infrastructure

Relevant Terms
Software

Reference
7111.06

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ben, an auditor, reviews an organization planning to move a business application to an external cloud service PaaS (platform as a service) vendor. Which of the following is the most crucial security consideration?

Cost of hosting the application externally compared to on-premises

Vendor reputation on the market and references from clients

Degradation of application performance due to use of shared services

Laws and regulations related to data hosting

A

Laws and regulations related to data hosting

This question is asking about the key security consideration that an auditor, named Ben in this scenario, should prioritize when evaluating an organization’s plan to migrate a business application to an external cloud service that operates on a Platform as a Service (PaaS) model.

In the context of cloud computing, PaaS provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app. Moving to a PaaS vendor involves various security considerations because the organization will be relying on third-party services for critical aspects of its application infrastructure.

The question implies that Ben needs to assess the security implications of this move comprehensively. The most crucial security consideration in such a scenario could involve a range of factors, including but not limited to:

Data Security and Privacy: Ensuring that the PaaS provider has robust mechanisms in place to protect the organization’s data against unauthorized access, breaches, and leaks. This includes encryption of data at rest and in transit, as well as adherence to privacy laws and regulations relevant to the organization’s operations.

Compliance with Relevant Regulations and Standards: Verifying that the PaaS provider complies with industry-specific regulations and standards (such as GDPR for data protection, HIPAA for healthcare information, or PCI DSS for payment card information) that the organization is subject to.

Cost of hosting the application externally compared to on-premises

Cost is an essential factor for the business to consider when moving to the cloud. However, the significant risk is with laws and regulations pertaining to data privacy laws.

Vendor reputation on the market and references from clients

A vendor’s reputation on the market and references from the client are essential factors for an organization to consider when moving to the cloud. However, the significant risk is violating laws and regulations related to data hosting.

Degradation of application performance due to use of shared services

Degradation of application performance due to shared services is an essential factor for an organization to consider during the move to the cloud. However, the highest risk is violating laws and regulations related to data hosting.

Cloud Computing

7111.08
7221.35

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud computing provides computer services and information without requiring a specific location or computing infrastructure. Which of the following is an example of a public cloud?

Google Compute Engine

A public university

A local municipality

IBM

Google Compute Engine

A

Google Compute Engine

Google Compute Engine is an example of a public cloud. Public clouds are services offered over the internet. Customers pay through advertisements or the resources that they consume.

The other answer choices are incorrect because public universities, local municipalities, and private businesses (such as IBM) are examples of private clouds.

Cloud Computing

Relevant Terms
Cloud
Cloud Computing

Reference
7111.13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ensuring system reliability is a top management issue. To successfully implement systems reliability principles, management must do all of the following except:

design and employ appropriate and cost-beneficial control procedures to implement the policies.

effectively communicate policies to all employees, customers, suppliers, and other authorized users.

monitor the system and take corrective action to maintain compliance with policies.

develop and document a comprehensive set of control policies at the same time that specific control procedures are designed and implemented.

A

develop and document a comprehensive set of control policies at the same time that specific control procedures are designed and implemented.

Correct
The correct answer is “develop and document a comprehensive set of control policies at the same time that specific control procedures are designed and implemented.” To successfully implement systems reliability principles, a company must develop and document a comprehensive set of control policies before (not at the same time as) designing and implementing specific control procedures.

The other answer choices are incorrect because they are all control procedures that are part of system reliability principles:

Effectively communicate policies to all employees, customers, suppliers, and other authorized users.
Design and employ appropriate and cost-beneficial control procedures to implement the policies.
Monitor the system and take corrective action to maintain compliance with policies.

Extra in Deck 90

Relevant Terms
Reliability

Reference
7113.38

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Jennifer, an auditor, is reviewing a hardware maintenance program. Which of the following should Jennifer assess?

The schedule of all unplanned maintenance

Whether it follows historical trends

Approval of the IT steering committee

Conformity with vendor maintenance specifications

A

Conformity with vendor maintenance specifications

A hardware maintenance schedule should be validated against vendor-provided specifications.

  • It is not possible to schedule unplanned maintenance.
  • It is not necessary to follow historical trends when developing hardware maintenance programs.
  • IT steering committees do not generally approve maintenance schedules.

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Committee of Sponsoring Organizations of the Treadway Commission (COSO) studies internal controls. They have defined internal controls to be used by boards of directors, management, and those following their direction. Which of the following is not a control objective of COSO?

Effectiveness and efficiency of operations

Reliability of financial reporting

Compliance with applicable laws and regulations

Guidance for evaluating external review programs

A

Guidance for evaluating external review programs

The Committee of Sponsoring Organizations of the Treadway Commission (COSO) defines internal controls within its framework as a process, effected by an entity’s board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories:

1.Effectiveness and efficiency of operations: This includes the use of the entity’s resources.
2.Reliability of financial reporting: This involves the preparation of reliable financial statements.
3.Compliance with applicable laws and regulations.

“ORC” Cloud Computing and COSO

Relevant Terms
Control Objective
COSO
Effectiveness
Efficiency
Internal Control
Reliability

Reference
7111.14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the best definition of cloud computing?

It allows users to access network resources from remote locations through a virtual private network.

It streamlines business processes onto a well-secured and highly available in-house e-commerce platform to optimize customers’ online experience.

It is designed for rapid application deployment by making several virtual servers run on one physical host.

It allows organizations to use the internet to access and use services and applications that run on remote third-party technology infrastructure.

A

It allows organizations to use the internet to access and use services and applications that run on remote third-party technology infrastructure.

Cloud computing is best defined as a model that enables organizations to use the internet to access and use services and applications that run on remote third-party technology infrastructure. Cloud computing provides shared resources, software, and information to users as a metered service run on a remote third-party infrastructure via the internet. This definition captures the essence of cloud computing.

It streamlines business processes onto a well-secured and highly available in-house e-commerce platform to optimize customers’ online experience.
This description focuses on streamlining business processes on an in-house platform and optimizing customer experiences, which is not the primary definition of cloud computing.

It is designed for rapid application deployment by making several virtual servers run on one physical host
This option describes virtualization and server deployment but does not capture the full scope of cloud computing.

It allows users to access network resources from remote locations through a virtual private network
This option mentions accessing network resources through a virtual private network, which is not the core concept of cloud computing.

Cloud Computing

Relevant Terms
Application
Cloud Computing
Software

Reference
7111.08
7111.09
7111.10
7111.11
7111.12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the most significant reason to create and maintain an asset inventory?

Help the organization to manage software assets

Monitor software licenses to protect against potential lawsuits over unlicensed assets

Allocate operating costs of assets to specific business areas

Protect the assets from internal and external threats

A

Protect the assets from internal and external threats

The most significant reason to create and maintain an asset inventory is to protect the assets from internal and external threats. Asset inventory allows an organization to have a comprehensive understanding of what assets it owns, where they are located, how they are used, and how they are protected. This information is crucial for implementing effective security measures to safeguard assets against threats, such as cyber attacks, theft, misuse, and unauthorized access.

While managing software assets, monitoring software licenses, and allocating operating costs of assets to specific business areas are important benefits of asset inventory, these activities primarily support operational efficiency, compliance, and financial management. The overarching goal of asset inventory in the context of cybersecurity and asset protection is to ensure that all assets are accounted for, evaluated for vulnerabilities, and adequately protected from potential security threats. This proactive approach to security management helps minimize risk and ensures the integrity, confidentiality, and availability of an organization’s critical assets.

Monitor software licenses to protect against potential lawsuits over unlicensed assets

To effectively monitor software for licensing issues, the organization first needs to create the list of assets. in a IT asset inventory. Cart before the horse.

Help the organization to manage software assets
IT asset inventory helps to manage both hardware and software assets in the organization.
They have left out half.

Allocate operating costs of assets to specific business areas
Allocate operating costs of assets to specific business areas.
This is a secondary advantage.

IT Asset Management

7111.17
7111.18
7111.19

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between SaaS, PaaS, and IaaS?

A

Key Differences:

  • Control and Flexibility: IaaS offers the most control and flexibility over your environment, followed by PaaS, with SaaS offering the least. This is because IaaS provides the infrastructure components, PaaS adds platform and development tools, and SaaS delivers the entire application stack.
  • Management Responsibility: With SaaS, the provider manages everything. PaaS requires users to manage applications and data, whereas IaaS users also need to manage middleware, runtime, and the OS.
  • Use Cases: SaaS is ideal for standard applications like email or collaboration tools; PaaS is suited for application development and deployment scenarios; IaaS is targeted at businesses looking for full control over their infrastructure without the costs associated with physical hardware.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the primary function of a server in a computer network?

Data encryption

Video editing

Data transmission

Resource sharing

A

Resource sharing

Servers are primarily used for resource sharing, allowing multiple users to access and utilize shared resources and services in a networked environment.

The primary function of a server in a computer network is to provide services to other computers or devices on the network, known as clients. These services can vary widely depending on the type of server, but generally, they include sharing data, resources, and applications. Servers are designed to process requests from clients and deliver the requested resources or data back to them. This can include serving web pages, handling email traffic, managing databases, providing file storage, executing applications, and facilitating various forms of communication and data exchange between clients.

Servers are powerful computers or computer programs that run continuously and are optimized for their specific tasks, offering high performance, reliability, and scalability to support the needs of multiple clients simultaneously. They play a crucial role in the infrastructure of both local and wide area networks, including the internet, enabling the centralized management of resources and services, which enhances efficiency, security, and control over the networked environment.

Data encryption

While servers can play a role in data encryption as part of security measures, it is not their primary function. Encryption is a specific task aimed at securing data during transmission or storage.

Video editing
Servers are generally not designed for video editing. Video editing is a resource-intensive task often carried out on specialized workstations or computers equipped with high-performance hardware and software.

Data transmission
Servers facilitate data transmission, but this is not their primary purpose. They are responsible for storing, managing, and serving data and resources to clients in a network. Data transmission is a function they support but not their core function.

IT Infrastructure

Relevant Terms
Network

Reference
7111.04

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary purpose of network infrastructure components such as switches and wireless access points (WAP)?

Data storage and backup

Data management

Resource optimization

Establishing connections and facilitating data transmission

A

Establishing connections and facilitating data transmission

Network infrastructure components (such as switches, routers, firewalls, and wireless access points (WAP)) primarily establish connections between various devices and servers for communication and data sharing. They also facilitate smooth and swift data transmission between connected entities.

Switches are used to connect multiple devices on a wired network, enabling them to communicate and share resources efficiently. They operate at the data link layer (Layer 2) of the OSI model and can also perform some routing functions (Layer 3) in the case of multilayer switches. Switches determine the destination of each data packet and forward it to the appropriate device on the network, using MAC addresses to process and route the data accurately.

Wireless Access Points (WAP) extend the wired network to wireless devices, allowing them to connect to the network without physical cables. WAPs operate by creating a local wireless network, usually based on Wi-Fi technology, enabling mobile devices, laptops, and other wireless-capable devices to access network resources and the internet.

Both switches and WAPs are crucial for establishing network connections and facilitating the efficient transmission of data between devices within a network, supporting communication and access to shared resources, applications, and the internet.

  • Data storage and backup are functions typically associated with storage systems and backup solutions, not network infrastructure components.
  • Data management involves organizing, storing, and retrieving data, which is a different aspect of IT.
  • Resource optimization, particularly in virtualization, is a separate concept and not the primary purpose of network infrastructure components.

IT Infrastructure

Relevant Terms
Data
Network

Reference
7111.05

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which component of the COSO Internal Control Framework is responsible for developing policies and procedures to govern cloud computing services?

Risk assessment

Control environment

Information and communication

Control activities

A

Control activities

Control activities are responsible for developing policies and procedures to govern cloud computing services, including data protection policies, access control procedures, and incident response plans. They also oversee implementing control activities like encryption, multifactor authentication, and security assessments in cloud computing.

The component of the COSO Internal Control Framework responsible for developing policies and procedures to govern cloud computing services is Control Activities. Control activities are the policies and procedures that help ensure management directives are carried out. They aim to prevent or detect and correct errors or irregularities. This includes a broad range of activities such as approvals, authorizations, verifications, reconciliations, performance reviews, security of assets, and segregation of duties.

Control environment
The control environment within the COSO Internal Control—Integrated Framework focuses on ethical values, integrity, oversight by the board of directors, organizational structure, and human resource policies. It ensures that personnel involved in cloud computing adhere to ethical values and demonstrate integrity, especially when handling sensitive data in the cloud. While it is important for overall governance, it does not specifically deal with developing policies and procedures for cloud computing services.

Risk assessment
Risk assessment involves identifying potential risks associated with cloud computing, analyzing them, and developing strategies to respond to them. It is crucial for understanding and managing risks but does not directly address the development of policies and procedures.

Information and communication
The information and communication component deals with mechanisms for communicating with external parties, such as cloud service providers and internal parties, to ensure that personnel know policies, procedures, and risks associated with cloud computing. While essential for cloud governance, this component is more focused on communication and awareness than on developing policies and procedures.

Cloud Computing

Relevant Terms
Cloud Computing
Control Activities
COSO
Internal Control

Reference
7111.14

Authorities
COSO Internal Control - Integrated Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following best represent examples of networking hardware components in IT infrastructure?

Enterprise resource planning (ERP) and customer relationship management (CRM)

Solid-state drives (SSD) and hard disk drives (HDD)

Intrusion detection systems (IDS) and firewalls

Hubs, bridges, and modems

A

Hubs, bridges, and modems

Hubs, bridges, and modems are examples of networking hardware components. Networking hardware enables connectivity and communication between devices.

The other answer choices are incorrect:

Enterprise resource planning (ERP) and customer relationship management (CRM) refer to software applications that manage business processes rather than networking hardware.
Solid-state drives (SSD) and hard disk drives (HDD) are storage devices used for data storage and retrieval and do not directly relate to network connectivity.
Intrusion detection systems (IDS) and firewalls represent network security components, not the hardware responsible for network connectivity.

IT Infrastructure

19
Q

Which software component is an intermediary between an operating system and its application?

Operating systems

Applications

Virtualization

Middleware

A

Middleware

Middleware is the software between an operating system and its applications, acting as an intermediary to facilitate communication and data management between different software components. Middleware is software that acts as an intermediary layer that allows different applications, systems, or services to communicate and interact with each other. It sits between the application layer and the operating system (and sometimes networking software) to facilitate the exchange of data, manage communication processes, and enable integration across diverse and distributed environments. Middleware simplifies the development of applications that require data from different sources or need to interact with other applications by providing a common framework for communication, thereby abstracting the complexities of underlying network protocols and hardware interfaces.

Virtualization

Virtualization in information technology refers to the process of creating a virtual (rather than actual) version of something, including but not limited to virtual computer hardware platforms, storage devices, and network resources. It involves using software to simulate the functionality of hardware to create a virtual system that can run multiple operating systems and applications on a single physical hardware base. This technology is foundational for cloud computing, allowing for the efficient allocation and utilization of resources, enhancing scalability, flexibility, and system management. For example, with servier vrtualization, a single physical server is divided into multiple unique and isolated virtual servers using a software application. Each virtual server can run its own operating systems independentlyVirtualization technology is a key enabler for modern IT infrastructures, supporting the deployment of highly scalable, efficient, and manageable computing environments, including private and public cloud platforms.

Operating Systems

An operating system (OS) in information technology is fundamental software that manages computer hardware and software resources and provides common services for computer programs. Essentially, it acts as an intermediary between users and the computer hardware. Operating systems are crucial for the functioning of computers; they manage hardware resources such as the CPU, memory (RAM), storage devices, and peripheral devices like printers and monitors, and ensure that applications running on the computer can perform efficiently and without interference.

Examples of Operating Systems:
Windows: Developed by Microsoft, it’s one of the most widely used OS in the world for personal computers.
macOS: Developed by Apple Inc., it is the OS for Mac computers, known for its graphical user interface.
Linux: An open-source OS used widely in servers, desktops, and embedded systems. It’s known for its stability and security.
Unix: A multi-user, multitasking operating system used in servers, workstations, and mobile devices.
iOS and Android: Mobile operating systems designed for smartphones and tablets, developed by Apple and Google, respectively.

IT Infrastructure

Relevant Terms
Application
Middleware
Operating System
Software

Reference
7111.01

20
Q

Which of the following cloud service models places most of the maintenance and security responsibility on the organization leasing the cloud-based resources?

Hybrid

PaaS

SaaS

IaaS

A

IaaS

The correct answer is IaaS (infrastructure as a service). With IaaS, users access the underlying cloud infrastructure resources, such as virtual machines and other abstracted hardware and operating systems. Users can self-provision their infrastructure from a console which enables users to build adaptable and customizable computer systems. Organizations have the most responsibility for maintenance and security when IaaS cloud resources.

Term: Infrastructure as a Service (IaaS)
Infrastructure as a service (IaaS) is a virtualized computer environment delivered as a service over the internet by a provider. Infrastructure can include servers, network equipment, and software. It is also called hardware as a service (HaaS).

The other answer choices are incorrect. The cloud service provider takes more responsibility with the platform as a service (PaaS) model and the most responsibility with the software as a service (SaaS) model. “Hybrid” refers to a cloud deployment model (not a service model) of a public and private cloud bound together.

Cloud Computing

Relevant Terms
Cloud Computing
Infrastructure as a Service (IaaS)

Reference
7111.08

21
Q

Which of the following components controls the flow of data into and out of an organization’s information system at network entry points during electronic commerce?

Turnkey system

Electronic lockbox

Electronic envelope

Firewall

A

IT security control activities include the use of passwords, firewalls, and access logs, which help to protect stored data from being accessed by unauthorized individuals, altered, or deleted.

A firewall is a network security device or software that is designed to monitor and filter incoming and outgoing network traffic. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet.

The other answer choices are incorrect:

A turnkey system is a pre-built, ready-to-use system that can be easily implemented. It is not specifically designed to control the flow of data into and out of an organization’s information system or provide network security.
An electronic lockbox is a system used for processing payments. It is not designed for controlling the flow of data at network entry points or providing network security.
An electronic envelope is a concept used in electronic communication to describe the packaging of digital information, ensuring its confidentiality and integrity. It is not a specific component used for controlling data flow at network entry points.

Firewall security systems

The purpose of a firewall is to protect internal information systems from external attacks. Firewalls address the requirement for authorized local area network (LAN) users and administrators, as well as individual workstation or personal computer users, to safely access and be accessed by untrusted (potentially hostile) external network connections.

Generally, the firewalls available today are associated with one of three categories:

  • Packet filtering
  • Application firewall systems
  • Stateful inspection
  • Packet filtering firewalls: Packet filtering firewalls (also called screening routers) commonly operate at the network layer (Open Systems Interconnection (OSI) layer 3). These firewalls check the IP (Internet Protocol) and protocol headers against a set of predefined rules. They can typically filter packets based on host and destination IP address, port number, and the interface. This type of firewall is generally inexpensive, fast, and transparent to the user. However, screening routers generally do not have a very robust auditing capability, nor do they allow the use of strong authentication on incoming connections. The combination of a packet filtering system and another product (authentication server) may provide strong authentication capability.
  • Application firewall systems: An application firewall is a device, server add‐on, virtual service, or system filter that defines a strict set of communication rules for a service and all users. The firewall is intended to be an application‐specific server‐side firewall to prevent application‐specific protocol and payload attacks.
  • Stateful inspection: A stateful inspection keeps track of the destination IP (Internet Protocol) address of each packet that leaves the organization’s internal network. The firewall not only examines data packets for IP addresses, applications, and specific commands, but also provides security logging and alarm capabilities, in addition to historical comparisons with previous transmissions for deviations from normal context.

IT Infrastructure

Relevant Terms
Control Activities
Information System

Reference
7222.66

22
Q

Which of the following components controls the flow of data into and out of an organization’s information system at network entry points during electronic commerce?

Electronic lockbox

Turnkey system

Electronic envelope

Firewall

A

Firewall

IT security control activities include the use of passwords, firewalls, and access logs, which help to protect stored data from being accessed by unauthorized individuals, altered, or deleted.

A firewall is a network security device or software that is designed to monitor and filter incoming and outgoing network traffic. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet.

The other answer choices are incorrect:

A turnkey system is a pre-built, ready-to-use system that can be easily implemented. It is not specifically designed to control the flow of data into and out of an organization’s information system or provide network security.
An electronic lockbox is a system used for processing payments. It is not designed for controlling the flow of data at network entry points or providing network security.
An electronic envelope is a concept used in electronic communication to describe the packaging of digital information, ensuring its confidentiality and integrity. It is not a specific component used for controlling data flow at network entry points.

IT Infrastructure

23
Q

Which of the following describes infrastructure as a service (IaaS)?

With IaaS, cloud providers host and manage both the software application and underlying infrastructure, and handle maintenance, like software upgrades and security patching.

IaaS is a method for delivering software applications over the internet, on demand and typically on a subscription basis.

IaaS refers to cloud computing services that supply an on-demand environment for developing, testing, delivering, and managing software applications.

IaaS provides the basic building blocks for cloud IT and typically provides access to IT assets from a cloud provider who charges on a pay-as-you-go basis.

A

IaaS provides the basic building blocks for cloud IT and typically provides access to IT assets from a cloud provider who charges on a pay-as-you-go basis.

Infrastructure as a service (IaaS) provides the basic building blocks for cloud IT. It typically provides access to IT infrastructure assets—servers and virtual machines (VMs), storage, networks, and operating systems—from a cloud provider who charges on a pay-as-you-go basis.

The other answer choices are incorrect:

Platform as a service (PaaS), not IaaS, refers to cloud computing services that supply an on-demand environment for developing, testing, delivering, and managing software applications, allowing developers to focus on creating and delivering those applications rather than worrying about resource procurement, capacity planning, software maintenance, or infrastructure management.
Software as a service (SaaS), not IaaS, delivers software applications over the internet, on demand, and typically on a subscription basis. With SaaS, cloud providers host and manage the software application and underlying infrastructure and handle maintenance, like software upgrades and security patching. Users connect to the application over the internet, usually with a web browser on their phone, tablet, or PC (personal computer).

24
Q

Which of the following hardware components provide(s) data and services to other computers over a network?

Networking hardware

Computers and workstations

Data centers

Servers

A

Servers are machines that provide data or services to other computers over a network. They are designed for this specific purpose and are essential to network infrastructure.

The other answer choices are incorrect:

Computers and workstations are user-end devices like PCs, laptops, and tablets. They are not designed to provide data or services to other computers over a network.
Data centers are facilities that house servers and related components but do not directly provide data or services to other computers over a network.
Networking hardware consists of devices like routers, switches, hubs, bridges, and modems that facilitate network communication but do not directly provide data or services to other computers.

from Reference: 7111.01
Hardware components:
Servers: Machines that provide data or services to other computers over a network
Computers and workstations: User-end devices like PCs (personal computers), laptops, and tablets
Data centers: Facilities that house servers and related components
Networking hardware: Routers, switches, hubs, bridges, and modems
Storage devices include SAN (storage area network), NAS (network-attached storage), magnetic tape systems, and other storage systems like SSDs (solid-state drives) and HDDs (hard disk drives).
Backup devices: Systems dedicated to backing up and restoring data, such as tape drives.

IT Infrastructure

Relevant Terms
Data
Network

Reference
7111.01

25
Q

Which of the following is a category of system interface?

System-to-system

Partner-to-partner

Person-to-person

All of the answer choices are correct.

A

All of the answer choices are correct.

All of the answer choices are correct. A system interface is a group of interrelated elements, including hardware and software, that interact through one or more computers. System interfaces refer to moving data output from one application as data input to another, with minimal human interaction. Interfaces that involve humans are user interfaces.

Data transfers through system interfaces can be categorized as the following:

System-to-system: Data is transferred between two systems, both internally within an organization or externally to other organizations. System-to-system interfaces are increasingly being used to transfer data to specialized tools for further analysis and insights through data mining.
Partner-to-partner: Partner-to-partner interface involves two organizations (partners) continuously exchanging data back and forth between their systems regularly.
Person-to-person: Person-to-person transfers can be as simple as sending an email communication. Person-to-person transfers are typically more challenging to capture, secure, and control.

System Interfaces

Reference
7111.20
7111.21

26
Q

Which of the following is a disadvantage of virtualization?

Snapshots

Misconfiguration of the hypervisor

Rootkits

All of the answer choices are disadvantages of virtualization.

A

All of the answer choices are disadvantages of virtualization.

Term: Virtualization
Virtualization is the act of creating a virtual rather than a physical version of a computing environment, including computer hardware, operating system, and storage devices.

Reference: 7222.70
Virtualization is used to host one or more operating systems within the memory of a single host computer. Thus, virtualization allows virtually any operating system (OS) to operate on any hardware and allows multiple operating systems to work simultaneously on the same hardware (e.g., VMware Workstation Pro). Virtualization has several benefits, such as deploying individual instances of servers or services as needed, real-time scalability, and running the exact OS version needed for a specific application.

The concept of OS virtualization has extended to other virtualization concepts, such as virtualized networks. A virtualized network combines hardware and software networking components into a single integrated entity. A virtualization hypervisor is computer software, firmware, or hardware that creates and runs a virtual machine environment—customarily called the “host.” The hypervisor is the component of virtualization that creates, manages, and operates virtual machines.

Reference: 7222.88
A virtualized environment can be deployed using one of the following methods:

**Bare metal: **The hypervisor runs directly on the underlying hardware, without a host operating system (OS).
Hosted virtualization: The hypervisor runs on top of the host OS (e.g., Windows, Linux). The hosted virtualization usually has an additional layer of software (the virtualization application) running in the guest OS that provides utilities to control the virtualization.
Containerization: Containers include the application and all its dependencies but share the kernel with other containers.

Key risk areas of virtualized systems

The following are high‐level risks for most of the virtualized systems in use:

Complex infrastructure: The complex configuration alone can be a big problem as it is more difficult to spot anomalies and unusual events happening in virtual machines and networks.
Dynamic design: Virtualized environments are dynamic by nature and constantly changing. Unlike adding physical equipment, virtual machines can go almost completely unnoticed as they are created in a matter of minutes and are not visible in the workspace.
Quick‐moving workloads: As the virtualized infrastructure grows, there will come a time when data needs to move from one machine to another. Unfortunately, when juggling multiple workloads over multiple virtual machines, mission‐critical data may accidentally move to a machine with minimal protection.
Misconfiguration of the hypervisor splitting resources (central processing unit (CPU), memory, disk space, and storage) can result in unauthorized access to resources, and one guest operating system (OS) may inject malware into another.
Rootkits on the host may install themselves as a hypervisor below the operating system (OS), which would enable the interception of any operations of the guest OS (i.e., logging password entry) as the malware runs below the OS. Antivirus software may not detect this.
Guest tools enable a guest OS to access files, directories, and other resources on the host OS. This functionality can inadvertently provide an attack vector for malware or allow an attacker to access resources.
Snapshots are backups of virtual machines and provide a quick mechanism to recover from errors or incomplete updates; they contain sensitive data such as passwords and personal data. Snapshots contain the random‐access memory (RAM) contents when the snapshot was taken, and they may include sensitive information that was not stored on the drive.
Hosted virtualization productsrarely have hypervisor access controls; therefore, if someone can launch an application on the host OS, they can run the hypervisor. The only access control is if someone can log into the host OS.

Relevant Terms
Antivirus Software
Malware
Operating System
Passwords
Virtualization

Reference
7222.70
7222.88
7222.89

27
Q

Which of the following is a key benefit of using system interfaces?

System interfaces ensure compliance with laws and regulations.

Data transmitted is encrypted to protect data during the transfer.

Interface functionality is impacted by different programming languages.

System interfaces allow flexibility in selection of applications.

A

System interfaces allow flexibility in selection of applications.

System interfaces facilitate data transfer even if the software of the two systems is written using two different programming languages. System interfaces offer organizations the flexibility to acquire applications that best serve their objectives and ensure that systems can interact and share data.

The answer choices “system interfaces ensure compliance with laws and regulations” and “data transmitted is encrypted to protect data during the transfer” are incorrect as these are controls that management should implement to mitigate inherent risks associated with system interfaces.

The answer choice “interface functionality is impacted by different programming languages” is incorrect. System interface functionality is not impacted by different programming languages as system interfaces facilitate data transfer even if the software of the two systems is written using two different programming languages.

System Interfaces

Relevant Terms
Application
Data

Reference
7111.20
7111.21
7111.22

28
Q

Which of the following is an advantage of cloud computing?

Execution of the computing services is under the control of the cloud service provider.

Third parties can access the interface.

A strong internet connection is required.

A business can reduce capacity to scale resources down.

A

A business can reduce capacity to scale resources down.

“A business can reduce capacity to scale resources down” is an advantage of cloud computing as cloud services offer unlimited storage capacity. This allows business to easily scale resources up or down to increase or reduce the capacity as per the needs of the business.

The need for a strong internet connection, third-party access to the interface, and execution of the computing services under the control of the cloud service producer are disadvantages of cloud computing.

Cloud Computing

Relevant Terms
Cloud Computing

Reference
7111.09
7111.10

29
Q

Which of the following is an example of a component of the control environment, as described in the COSO Internal Control Framework?

Implementing security controls like encryption

Identifying potential cloud-related risks

Developing policies and procedures for data protection

Board of directors’ oversight

A

Board of directors’ oversight

In the COSO Internal Control—Integrated Framework, board of directors’ oversight is an example of a component of the control environment. This component emphasizes the board’s role in overseeing strategy and policies to ensure they align with the organization’s objectives and risk tolerance.

The other answer choices are incorrect:

  • Developing policies and procedures for data protection is an example of control activities, not the control environment.
  • Identifying potential cloud-related risks falls under the risk assessment component, not the control environment.
  • Implementing security controls like encryption is part of control activities, not the control environment.

Term: Control Environment
According to AU-C 315.A79, the control environment is as follows: “The control environment sets the tone of an organization, influencing the control consciousness of its people. It is the foundation for all other components of internal control, providing discipline and structure.”

Control environment
* * Ethical values and integrity: Ensures that the management and personnel involved in cloud computing adhere to ethical values and demonstrate integrity, especially when handling sensitive data in the cloud
* * Board of directors’ oversight: The board oversees the strategy and policies related to cloud computing to ensure that they align with the organization’s objectives and risk appetite.
* * Organizational structure: Defines the roles and responsibilities concerning cloud computing governance, establishing clear lines of reporting and communication
* * Human resource policies: Develops policies to ensure that personnel involved in cloud computing have the necessary skills and knowledge to manage risks effectively

Cloud Computing and COSO

Relevant Terms
Control Environment
COSO
Internal Control

Reference
7111.14

Authorities
COSO Internal Control - Integrated Framework

30
Q

Which of the following is not a responsibility of a cloud service provider (CSP)?

Encrypting data stored in the cloud to prevent unauthorized access

Compliance with data protection regulations such as GDPR and HIPAA

Offering the ability to scale resources up or down based on demand quickly

Management of end-user devices and workstations

A

Management of end-user devices and workstations

Management of end-user devices and workstations is typically the responsibility of the customers or end users themselves, as CSPs primarily focus on cloud infrastructure and services rather than individual end-user devices.

The other answer choices are incorrect:

Encrypting data stored in the cloud is the responsibility of CSPs to ensure data security and prevent unauthorized access.
Compliance with data protection regulations like GDPR (General Data Protection Regulation) and HIPAA (the Health Insurance Portability and Accountability Act of 1996) is a crucial responsibility of CSPs to ensure they adhere to legal obligations and protect customer data.
Offering the ability to quickly scale resources up or down based on demand is another key responsibility of CSPs to provide flexibility and cost-effectiveness to their customers.

Cloud Computing

Relevant Terms
Cloud
Cloud Computing
Encryption

Reference
7111.13
7210.20
7210.27

31
Q

Which of the following is not required to be included in the IT assets inventory?

Hardware

Noncritical software

Software licenses

Decommissioned applications

A

Decommissioned applications

Decommissioned applications are not required to be part of the IT assets inventory as they are no longer active on the company’s IT network. Decommissioned applications may be tracked in a separate inventory listing.

IT asset management encompasses all assets considered valuable to the organization, including physical assets, i.e., computer hardware and software assets such as off-the-shelf applications and software registration keys. “Hardware,” “noncritical software” and “software licenses” are incorrect answers as they are required to be included in the assets inventory.

IT Asset Management

Relevant Terms
Application
Asset

Reference
7111.17
7111.18
7111.19

32
Q

Which of the following is one of the key aspects of cloud service providers’ (CSPs) responsibilities regarding data security?

Service-level agreements (SLAs)

Customer support

Network management

Data encryption at rest

A

Data encryption at rest

Data encryption at rest is a crucial responsibility of CSPs. It involves encrypting data stored in the cloud to prevent unauthorized access. By encrypting data at rest, CSPs enhance the security of stored information, ensuring that even if data is compromised physically, it remains unreadable without proper decryption.

The other answer choices are incorrect:

> Service-level agreements (SLAs) define the terms, responsibilities, and performance standards in the contractual relationship between CSPs and their customers. While SLAs are important, they address service quality and uptime guarantees rather than data security.
Providing customer support is a responsibility of CSPs, but it primarily pertains to assisting customers with service-related inquiries, technical issues, and general support. It is essential for a positive customer experience but not a specific aspect of data security.
Network management encompasses traffic management, security measures, and network connectivity. While network security is important for data security, it is a broader category that includes aspects beyond data encryption.

Cloud Computing

elevant Terms
Cloud
Cloud Computing
Encryption

Reference
7111.13

33
Q

Which of the following is one of the methods to deploy a virtualized environment?

Containerization

Hosted virtualization

Bare metal

All of the answer choices are correct

A

All of the answer choices are correct

All of the answer choices are correct. A virtualized environment can be deployed using one of the following methods:

Bare metal: The hypervisor runs directly on the underlying hardware without a host operating system (OS).
Hosted virtualization: The hypervisor runs on top of the host OS (e.g., Windows, Linux). The hosted virtualization usually has an additional layer of software (the virtualization application) running in the guest OS that provides utilities to control the virtualization.
Containerization: Containers include the application and all its dependencies but share the kernel with other containers.

34
Q

Which of the following is the most difficult to implement in a distributed environment?

Scalability

Heterogeneity

Synchronization

Security

A

The correct answer is security. Managing security is a major problem since distributed systems operate in hostile environments. Due to its diversity, system users or hackers may want to breach system security, and user identification and authentication mechanisms are difficult to implement in a positive manner.

The other answer choices are incorrect:

  • Scalability can be achieved by adding more units to the system. However, there is a point of diminishing returns to be experienced where increased overhead will lead to degraded performance.
  • Heterogeneity can be handled properly with open systems design. A problem arises when a vendor management system cannot be modified or work with other systems in a heterogeneous environment.
  • Although synchronization and distribution are standard problems of a distributed system, they can be handled properly. Synchronization solves the problem of how to distribute system changes so that each computer system picks up the changes at the same time. Gateways and translator products have been created to facilitate such synchronization, that is, data transfer between heterogeneous systems.
35
Q

Which of the following is the most difficult to implement in a distributed environment?

Scalability

Heterogeneity

Security

Synchronization

Security

A

Security

Managing security is a major problem since distributed systems operate in hostile environments. Due to its diversity, system users or hackers may want to breach system security, and user identification and authentication mechanisms are difficult to implement in a positive manner.

The other answer choices are incorrect:

  • Scalability can be achieved by adding more units to the system. However, there is a point of diminishing returns to be experienced where increased overhead will lead to degraded performance.
  • Heterogeneity can be handled properly with open systems design. A problem arises when a vendor management system cannot be modified or work with other systems in a heterogeneous environment.
  • Although synchronization and distribution are standard problems of a distributed system, they can be handled properly. Synchronization solves the problem of how to distribute system changes so that each computer system picks up the changes at the same time. Gateways and translator products have been created to facilitate such synchronization, that is, data transfer between heterogeneous systems.

Reference: 7111.15
Common enterprise back‐end devices

Various devices deliver application services in a distributed environment. Growing usage of the internet of things (IoT) has been an essential consideration in recent years. Organizations must understand how connected devices such as cars, thermostats, video cameras, and medical equipment impact their operations. IoT can lead to significant innovations, productivity gains, and new services. However, IoT also poses privacy concerns due to personally identifiable information (PII), user tracking capabilities, and risks of data leakage.

Cloud Computing

7115.15

36
Q

Which of the following is the most difficult to implement in a distributed environment?

Scalability

Heterogeneity

Synchronization

Security

A

Security

Managing security is a major problem since distributed systems operate in hostile environments. Due to its diversity, system users or hackers may want to breach system security, and user identification and authentication mechanisms are difficult to implement in a positive manner.

The other answer choices are incorrect:

Scalability can be achieved by adding more units to the system. However, there is a point of diminishing returns to be experienced where increased overhead will lead to degraded performance.
* Heterogeneity can be handled properly with open systems design. A problem arises when a vendor management system cannot be modified or work with other systems in a heterogeneous environment.
* Although synchronization and distribution are standard problems of a distributed system, they can be handled properly. Synchronization solves the problem of how to distribute system changes so that each computer system picks up the changes at the same time. Gateways and translator products have been created to facilitate such synchronization, that is, data transfer between heterogeneous systems.

Cloud Computing

Relevant Terms
Authentication
Distributed Data Processing
Identification
Scalability
Security

Reference
7111.15

37
Q

Which of the following outlines the risk assessment component defined in the COSO Internal Control Framework related to cloud computing governance?

Defines the roles and responsibilities concerning cloud computing governance, establishing clear reporting and communication lines

Establishes mechanisms for communication with cloud service providers and other external parties to manage risks effectively

Implements controls to ensure the reliability and security of the information and communication technology used in cloud computing

Identifies potential risks associated with cloud computing services, including data breaches, service interruptions, and compliance risks

A

Identifies potential risks associated with cloud computing services, including data breaches, service interruptions, and compliance risks

This option describes identifying potential risks associated with cloud computing services, which is part of the risk assessment component in the COSO Internal Control—Integr

The other answer choices are incorrect:

“Defines the roles and responsibilities concerning cloud computing governance, establishing clear reporting and communication lines” refers to the control environment and organizational structure, not risk assessment.
“Establishes mechanisms for communication with cloud service providers and other external parties to manage risks effectively” relates to the information and communication component, focusing on communication with external parties, and is not directly tied to risk assessment.
“Implements controls to ensure the reliability and security of the information and communication technology used in cloud computing,” while important for cloud computing security, is more aligned with the control activities component, emphasizing the implementation of controls to ensure the reliability and security of information and communication technology in cloud computing. It is not specific to risk assessment.

Cloud Computing

Reference
7111.14

Authorities
COSO Internal Control - Integrated Framework

38
Q

Which of the following responsibilities of a cloud service provider is essential to ensure customers can access information on the company’s website during peak visiting hours?

Regulatory compliance

Knowledge sharing

Scheduled backups

Dynamic scaling

A

Dynamic scaling

Dynamic scaling allows the cloud infrastructure to adapt and allocate resources based on demand. During peak hours, it ensures that the website can handle increased traffic effectively.

The other answer choices are incorrect:

Knowledge sharing is essential for educating customers but does not directly contribute to managing website traffic during peak hours.
While important for data protection, scheduled backups are not specifically geared toward managing website traffic during peak hours.
Regulatory compliance is necessary but primarily focuses on adhering to legal and data protection requirements rather than addressing website performance during peak hours.

Reference: 7111.13
Resource scalability
* Resource allocation
1. Dynamic scaling: Offering the ability to scale resources up or down based on demand quickly
1. Resource monitoring: Providing tools for monitoring resource usage and performance
* Cost-effectiveness
1. Pay-as-you-go pricing: Offering flexible pricing models where customers pay only for the resources they use
1. Cost optimization tools: Providing tools to help customers manage and optimize their cloud spending

7111.13

39
Q

Which of the following should be included in the application inventory?

The asset owner and custodians

The impact of the asset’s loss on the organization

The asset’s security classification

All of the answer choices are correct.

A

All of the answer choices are correct.

All of the answer choices are correct. The application inventory should include critical information including but not limited to the asset owner, asset custodian, asset’s value to the organization, impact of the asset loss and recovery prioritization, asset location, and security classification.

IT Asset Management

Relevant Terms
Application
Asset

Reference
7111.17
7111.18
7111.19

40
Q

Which of the following statements about virtualized deployment is false?

Containers include the application and its dependencies but share the kernel with other containers.

The hosted virtualization usually has an additional layer of software running in the guest OS.

All of the answer choices are true statements about virtualized deployment.

The hypervisor runs directly on the host OS.

A

The hypervisor runs directly on the host OS.

The hypervisor runs directly on the underlying hardware, without a host operating system (OS). This method is called bare metal.

The other answer choices are true statements. A virtualized environment can be deployed using one of the following methods:

  • Hosted virtualization: The hypervisor runs on top of the host OS (e.g., Windows, Linux). The hosted virtualization usually has an additional layer of software (the virtualization application) running in the guest OS that provides utilities to control the virtualization.
  • Containerization: Containers include the application and all its dependencies but share the kernel with other containers.
  • Bare metal: The hypervisor runs directly on the underlying hardware without a host OS.

Reference: 7222.70
Virtualization is used to host one or more operating systems within the memory of a single host computer. Thus, virtualization allows virtually any operating system (OS) to operate on any hardware and allows multiple operating systems to work simultaneously on the same hardware (e.g., VMware Workstation Pro). Virtualization has several benefits, such as deploying individual instances of servers or services as needed, real-time scalability, and running the exact OS version needed for a specific application.

The concept of OS virtualization has extended to other virtualization concepts, such as virtualized networks. A virtualized network combines hardware and software networking components into a single integrated entity. A virtualization hypervisor is computer software, firmware, or hardware that creates and runs a virtual machine environment—customarily called the “host.” The hypervisor is the component of virtualization that creates, manages, and operates virtual machines.

Reference: 7222.88
A virtualized environment can be deployed using one of the following methods:

  • Bare metal: The hypervisor runs directly on the underlying hardware, without a host operating system (OS).
  • Hosted virtualization: The hypervisor runs on top of the host OS (e.g., Windows, Linux). The hosted virtualization usually has an additional layer of software (the virtualization application) running in the guest OS that provides utilities to control the virtualization.
  • Containerization: Containers include the application and all its dependencies but share the kernel with other containers.

See hypervisor in vocabulary deck

41
Q

Which of the following statements describes the auditor’s role in reviewing system interfaces?

Data transferred is validated for completeness and accuracy.

Data transmitted is protected through encryption and passwords.

System interface activity is captured using an audit trail.

All of the answer choices are correct.

A

All of the answer choices are correct.

All of the answer choices are correct. The auditor should determine the following when reviewing system interfaces:

  • Whether data transferred through system interfaces is validated for completeness and accuracy
  • Whether data transmitted through system interfaces is protected through encryption and password protection techniques
  • Whether system interface activity is captured using an audit trail that records information, including the sender and the recipient of the data, when data was transmitted and received, and the encryption protocols applied to the data

Reference: 7111.23
Auditor’s role in auditing system interfaces

The auditor must determine whether the auditee has knowledge of all internal and external interfaces in its IT environment and whether there is a process to track and manage the system interfaces. The auditor should design procedures to review the managed file transfer (MFT) solution and determine whether it supports commonly used file transfer formats and is compatible with the organization’s existing technology platforms and applications. Additionally, the auditor should determine whether the MFT solution has built‐in mechanisms to protect the data in transit (e.g., through encryption), has a job scheduling and monitoring function, and complies with applicable laws and regulations.

The auditor should determine whether data transferred through system interfaces is validated for completeness and accuracy. The auditor should also determine whether data transmitted through system interfaces is protected through encryption and password protection techniques. Organizations should implement controls over nonrepudiation to ensure that only the targeted recipient is the data recipient.

An IS auditor should also determine whether system interface activity is captured using an audit trail that records information, including the sender and the recipient of the data, when data was transmitted and received, and the encryption protocols applied to the data.

System Interfaces

Relevant Terms
Accuracy
Audit Trail (Audit Log)
Completeness
Encryption
Passwords

Reference
7111.23

42
Q

Which of the following statements is true about system interfaces?

System interfaces move data input from one application to another.

System interfaces move data with significant human interaction.

None of the answer choices are correct.

System interfaces move data output from one application to another.

A

System interfaces move data output from one application to another.

System interfaces refer to moving data output from one application as data input to another, with minimal human interaction.

The answer choice “system interfaces move data input from one application to another” is incorrect since system interfaces refer to moving data output from one application to another.

The answer choice “system interfaces move data with significant human interaction” is incorrect as system interfaces require minimal human interaction.

Reference: 7111.20
A system interface is a group of interrelated elements, including hardware and software, that interact through one or more computers. System interfaces refer to moving data output from one application as data input to another, with minimal human interaction. Interfaces that involve humans are user interfaces.

System interfaces facilitate data transfer even if the software of the two systems is written using two different programming languages. System interfaces offer organizations the flexibility to acquire applications that best serve their objectives and ensure that systems can interact and share data.

System Interfaces

Relevant Terms
Application
Data

Reference
7111.20
7111.21
7111.22

43
Q

XYZ Compute Cloud is a web service that provides resizable computer capacity in the cloud. It makes web-scale computing easier for developers. It provides companies with complete control of their computing resources and lets them run on Amazon’s proven computing environment. It also allows companies to quickly scale capacity, both up and down, as their computing requirements change. What type of cloud computing service is XYZ Compute Cloud providing?

Platform as a service (PaaS)

Software as a service (SaaS)

None of the answer choices are correct.

Infrastructure as a service (IaaS)

A

Infrastructure as a service (IaaS)

The correct answer is infrastructure as a service (IaaS). In IaaS, the consumer is provided with fundamental computing resources such as processing power, storage, networking components, or middleware. The consumer can control the operating system, storage, deployed applications, and possibly networking components such as firewalls and load balancers, but not the cloud infrastructure beneath them. As XYZ provides companies with complete control of their computing resources, it is providing infrastructure as a service.

The other answer choices are incorrect:

  • Software as a service (SaaS) provides the application but does not control the operating system, hardware, or network infrastructure on which it is running.
  • Platform as a service (PaaS) provides consumers with a hosting environment for their applications. The consumer controls the applications that run in the environment but does not control the software, hardware, or network infrastructure on which they are running.

Reference: 7111.08
Infrastructure as a service (IaaS): Users can access the underlying cloud infrastructure resources, such as virtual machines and other abstracted hardware and operating systems. Users can self‐provision their infrastructure from a console to build adaptable and customizable computer systems.

ChatGPT
The cloud computing service provided by XYZ Compute Cloud falls under the category of “Infrastructure as a Service (IaaS).”

IaaS offers resizable computing capacity in the cloud, giving companies control over their computing resources and the ability to scale capacity up and down as needed. In this case, XYZ Compute Cloud is providing the infrastructure (virtual machines, storage, networking, etc.) for companies to build and run their own applications, making it an IaaS offering.

Cloud Computing

Relevant Terms
Cloud
Cloud Computing
Infrastructure as a Service (IaaS)
Network
Operating System

Reference
7111.08

44
Q

Your organization is discussing whether to obtain computer center automation software products from one vendor or from multiple vendors. The most significant issue with multiple vendors is to determine whether:

they have a single learning curve.

they run on a single screen.

they use a single database.

interfaces between systems are compatible and workable.

A

interfaces between systems are compatible and workable.

The correct answer is “interfaces between systems are compatible and workable.” System interfaces facilitate data transfer even if the software of the two systems is written using two different programming languages. System interfaces offer organizations the flexibility to acquire applications that best serve their objectives and ensure that systems can interact and share data.

The other answer choices are incorrect as single screen, single database, and single running curve are benefits of obtaining the software product from a single vendor.

System Interfaces

Relevant Terms
Disk Management

Reference
7111.20
7111.21
7111.22
7111.23