Personal Topics Flashcards

Missed MCQs

1
Q

What are the components of the governance system under COBIT 2019?

A

processes,
org structures
principles, policies & frameworks
information
culture & ethics,
people, skills & competencies
services, infrastructure & applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HIPPA Violations ($)?

A

Tier 3 is willful neglect
$10K min per violation
$50K max per violation
$1.5M annual cap for identical violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System backup methods (full, incremental, differential) - which takes the least amount of downtime to create the backup file?

A

Greatest to least:
Full > differential > incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is RPO?

A

RPO = recovery point objective
RPO = the maximum amount of some metric that is intolerable (ex: a company can tolerate losing 1,000 units per day due to a power outage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is “WHERE” used for in SQL?

A

to filter records based on certain criteria (ex: find values exceeding $1,000)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the asterik “*” used for in SQL?

A
  • is used to select every single value
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When do you reference complementary user entity controls (CUECs) in the SOC1 audit report?

A
  • Required to reference in the opinion section of the SOC1 report when the controls are necessary to meet standard control objectives of the service org in conjunction with the controls of the service org
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should be included in the SOC 2 Type 2 Report in the ‘Description of Test of Controls’ section?

A
  • the controls tested
  • whether the items tested represent all or a selection of items in the population
  • nature of tests performed so that users can determine the effect on their risk assessments
  • number of items tested only if there are deviations. do not mention if no exceptions are noted.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the carve-out method?

A
  • for complementary subservice org controls
  • less extensive
  • service org management should exclude complementary subservice org controls from the description of the service org’s system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the inclusive method?

A
  • for complementary subservice org controls
  • most extensive
  • required to have written representations from subservice & the service org’s managements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are differential backups?

A
  • Backup all data since the last full backup
  • fastest to restore
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of an AUP (org vs mobile device)?

A
  • Organizational: broader in scope; regulates and protects technology resources by assigning varying levels of responsibilities to job roles, listing acceptable behavior by users
  • Mobile devices: limited in scope; defined policies for how mobile devices may be used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which common criteria and which additional specific criteria related to the trust services criteria must a service auditor address?

A
  • the common criteria for all trust services categories
  • address additional specific criteria for all but security (only for confidentiality, processing integrity, privacy and availability)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If a virus infects a business network, who would be affected?

A
  • vendor’s systems can get infected
  • partner orgs may reallocate resources to help thereby disrupting operations
  • customers’ ordering systems may be infected

Note: an employee trying to log onto the orgs website to log time would not be affected (us trying to log into PayCom-we wouldn’t be affected)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is recovery time objective (RTO)?

A

The maximum amount of targeted time to restore a company to its usual operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Should orgs have separate risk management strategies from their CSP’s?

A

No - they should integrate for a cohesive way to manage risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SQL: join vs left join

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In what type of report do you test operating effectiveness of controls?

A
  • SOC type 2; when the service org uses the inclusive method to present its services and controls, tests of operating effectiveness of controls would extend to the relevant controls of a sub service org
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the service auditor’s responsibility vs service org management’s responsibility in an SOC engagement?

A
  • Service auditor: responsible for ensuring appropriate controls are in place and that internal employees are aware of how to appropriately report incidents
  • Service org management: design, implement, and maintain internal controls; ensure that incidents are remediated timely; ensure that any incidents or control deviations are identified; make assertions about the system’s design, operation, and effectiveness
20
Q

What do routers do?

A
  • hardware or software devices
  • manage network traffic by connecting devices
  • assign IP addresses
21
Q

What do gateways do?

A
  • convert protocols so networks can communicate
  • act as intermediaries
22
Q

What do servers do?

A
  • execute commands and provide computing power for other machines on the network
  • coordinate data, programs, and computers so the network can operate
23
Q

Open Systems Interconnection (OSI) Model

A
  • a construct used to explain how different protocols work in a network by breaking network functions into seven layers
  • 7 layers
24
Q

Are causative factors optional or required in SOC reports?

A
  • causative factors are optional
  • if included, they go in the Description of Tests of Controls section
25
What are the primary forms of data collection?
Surveys, interviews, and observation (it’s new data collection)
26
What is a secondary form of data collection?
Analyzing documents (it’s already existing data)
27
Where is service auditor independence and objectivity mentioned in the SOC report?
In the introductory section
28
What do you omit from the SOC report when a disclaimer of opinion is given?
When a disclaimer of opinion is used, the report should omit an explanation of what is required by the professional standards of the service auditor, a statement that sufficient and appropriate evidence was obtained, and a statement describing the nature of an examination engagement.
29
Mirroring versus replication
Mirroring increases redundancy and only requires one site, whereas replication requires a secondary site
30
Risk of data security heightens at what stage in the data life cycle?
- publication stage, where data is made available externally
31
Who issues standards for CSPs?
Cloud Security Alliance
32
Cloud service providers can be IaaS (Infrastructure-as-a-Service) companies that provide only the core IT hardware infrastructure, PaaS (Platform-as-a-Service) companies that provide core infrastructure plus some IT management services and the ability to develop applications, or SaaS (Software-as-a-Service) companies that provide all infrastructure, management of the environment, and application design. The alternative to these options is for organizations to house and maintain their own data centers, servers, and networking equipment and be responsible for all application design.
33
Who decides whether the carve out or inclusive method is used for the SOC report?
- management of the service org is responsible for deciding whether to carve out or include the sub service org’s controls in the description of the system & in the scope of the engagement - inclusive method- CSOCs are mentioned and evaluated for their effectiveness
34
Redundant infrastructure
A company should have alternate sites that are many (maybe even hundreds) of miles away from each other to ensure that each site is not affected or wiped out by the same natural disaster or disruption
35
What metric to look at for continuing relationships with insurance companies?
The highest reimbursement rates, not the denials
36
Recover NIST core function
- returning to normal operations - transitioning from a state of vulnerability to a state where that vulnerability no longer exists
37
When you use the carve out method, what is required in management’s system description?
- The description excludes control objectives and related controls at the subservice organization, but does include a description of the services performed by the subservice organization - an indication of whether the inclusive or carveout method has been used - any complementary subservice organization controls (CSOCs) assumed in the design of the service organization controls
38
Which TSC does incident reporting and identification, response procedures apply to?
- All TSC
39
What TSC does hot site migrations & testing recovery plans & backup recovery relate to?
- Availability specific (hot sites are used when the main site is unavailable) - testing a recovery plan also related to availability of alternate site usage
40
What is a DDOS attack?
- Distributed denial of service: Multiple computers overloading a server with requests so that the system doesn’t function as normal anymore
41
Buffer overflow
Sending more data than a buffer can handle allowing for a malicious attack
42
IaaS (Infrastructure as a Service)
Provided the underlying infrastructure and users are responsible for managing data, operating systems and applications. The provider is responsible for managing the infrastructure Example: Amazon web services
43
What’s the main goal of a management written assertion (in SOC 2 Type 2 report)?
to provide assurance to clients and users regarding the design and effectiveness of the service org’s controls
44
What is a honeypot?
a decoy system or network meant to attract potential hackers; a defensive measure to learn how to better protect a system or network
45
What’s the main danger of a buffer overflow attack?
it gives room for the attacker to execute arbitrary code and inject the system with malicious activity and they’ll have control over the system