try Flashcards

1
Q

Which overview explanation best summarizes CIS Control 13: Network Monitoring and Defense?
A. Establish, implement, and actively manage network devices in order to prevent attackers from exploiting vulnerable
network services and access points.
B. Establish a program to develop and maintain an incident response capability to prepare, detect, and quickly
respond to an attack.
C. Operate processes and tooling to establish and maintain comprehensive network and monitoring defense against
security threats across the enterprise’s network infrastructure and user base.
D. Manage the security life cycle of in-house developed, hosted, or acquired software to prevent, detect, and
remediate security weaknesses before they can impact the enterprise

A

<3>

Choice “A” is incorrect. Under CIS Critical Security Controls Version 8, this explanation best describes Control 12: Network
Infrastructure Management.
Choice “B” is incorrect. Under CIS Critical Security Controls Version 8, this explanation best describes Control 17: Incident
Response Management.
Choice “D” is incorrect. Under CIS Critical Security Controls Version 8, this explanation best describes Control 16: Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Center for Internet Security (CIS) Control principle was designed to have all recommendations be practical?
A. Measurable
B. Align
C. Focus
D. Feasible

A

<4>

A. Measurable–>simple and measurable, avoiding vague language.含糊不清的语言
C. Focus–> map to other top cybersecurity standards
D. Feasible–>prioritize ,resolving 有助于确定最关键问题的优先次序,避免解决所有网络安全问题。避免解决所有网络安全问题。

其他选项如 “Measurable”、”Align” 和 “Focus” 虽然也是重要的原则,但它们并不直接关注建议的实用性或可行性。”Measurable” 强调的是控制措施的可测量性,”Align” 与确保控制措施与业务目标和需求保持一致有关,而 “Focus” 则关注于将资源和努力集中在最重要的安全控制上。因此,”Feasible” 是最直接体现建议必须实际可行的原则。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following components of the NIST CS Framework Core describes the function that outlines how a company should notify
all affected parties while containing a cybersecurity event?
A. Recover
B. Respond
C. Detect
D. Protect

A

<2>

3–> Identify the tools and resources needed to detect active cybersecurity attacks.

4–> Safeguards and access as well as regular updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When conducting an audit of a service organization’s network infrastructure, a service auditor finds a device that acts as the network’s central hub and is therefore a potential single point of failure if it quits working. Which topology is least likely to result in a potential single point of failure?
A. Mesh topology
B. Ring topology
C. Star topology
D.Bus topology

A

<1>
在对服务机构的网络基础架构进行审计时,服务审计员发现一台设备充当了网络的中枢。
因此,如果它停止工作,就有可能成为单点故障。哪种拓扑最不可能导致潜在的单点故障?

3–>有一个中央集线器,所有数据都通过它传递到其他外围设备。
4–>所有设备共享一条通信线路或总线;数据广播到所有设备,但只有目标接收者接受并处理数据。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which CIS Control best describes the recommendation to establish and maintain practices relevant to data sufficient to restore in-
scope enterprise assets to a pre-incident and trusted state?
A. Control 11: Data Recovery
B. Control 10: Malware Defenses
C. Control 15: Service Provider Management
D. Control 16: Application Software Security

A

<1>
1–>建立和维护数据建立和维护足以将范围内的企业资产恢复到事故前可信状态的数据恢复措施。

选择 “B “不正确。防止或控制
防止或控制在企业资产上安装、传播和执行恶意应用程序、代码或脚本。
选择 “C “不正确。 制定一个流程,以制定一个流程,评估持有敏感数据或负责企业关键 IT 平台或流程的服务提供商,以确保
确保这些提供商适当保护这些平台和数据。
选择 “D “不正确。管理安全生命周期管理内部开发、托管或购置的软件的安全生命周期,以防止、检测和修复安全弱 点,避免其对企业造成影响。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A system that transforms economic events into journal entries and disseminates information that supports daily operations is:
A. An enterprise resource planning system.
B. A transaction processing system.
C. A management reporting system.
D.A financial reporting system.

A

<2>

選項B與D的關係是,交易處理系統(TPS)提供了記錄每日交易的基本功能,而這些交易的數據被財務報告系統(FRS)用於生成公司對外報告的財務狀況和業績的正式文檔。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is least likely to be an example of an administrative safeguard required for an organization considered a covered
entity under HIPAA guidance in relation to its administrative functions?
A. Information access management
B. Security awareness and training
C. Facility access controls
D. Contingency plans

A

<3>
设施访问控制被视为 HIPAA 要求的物理保障措施,不属于行政保障措施。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Within the data life cycle, what is generally considered the first step of the life cycle defining what data a business needs and where to
capture or retrieve such data?
A. Publication
B. Synthesis
C. Definition
D. Preparation

A

<3>

数据生命周期从以下步骤开始:

定义:这一初始阶段包括确定业务的数据需求–确定需要哪些数据以及应从何处获取数据。

Capture/Creation:捕获/创建:在定义数据需求后,将采集或创建实际数据。

prepare准备:一旦收集到数据,就需要对其进行准备,以确保数据完整、干净、最新且方便用户使用。这可能涉及加密和其他处理,以使数据可随时使用。

Synthesis合成:这包括创建计算字段和组织数据,以方便快速使用和分析。not neccessary

Usage使用:然后将数据用于预期目的,如决策或操作任务。

Publication发布:最后,数据可能会被共享或发布,供外部使用,如向客户发送报表或发布报告。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following framework functions in the Privacy Framework Core best describes the function that would include categories
such as risk management strategy, awareness and training, and monitoring review?
A. Control
B. Govern
C. Protect
D. Identify

A

<2>

Explanation
Choice “B” is correct. the govern function
–>
governance policies, process, and procedures;
risk management strategy;
awareness and training;
and monitoring review.

Choice “A” is incorrect.
the control function–>
data processing policies, processes, and procedures;
data processing management;
and disassociated processing.

Choice “C” is incorrect. the protect function–>
data protection policies, processes, and procedures;
identity management, authentication, and access control;
data security; maintenance;
and protective technology.

Choice “D” is incorrect. the identify function –>
inventory and mapping,
business environment,
risk assessment,
and data processing ecosystem risk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BeanCard Corporation is a financial institution that processes credit card payments, coordinating with retailers, banks, and customers.
In order for BeanCard Corporation to comply with the Payment Card Industry Data Security Standard (PCI DSS) in relation to the goal of
protecting cardholder data, which of the following actions would Bean Card Corporation most likely take?
A. Encrypt the transmission of cardholder data across open, public networks.
B. Regularly test security systems and processes.
C. Restrict physical access to cardholder data.
D. Maintain a policy that addresses information security for all personnel.

A

1

为了达到保护持卡人数据的目标,Bean Card 公司最有可能采取以下哪种措施?
A. 在开放的公共网络上加密传输持卡人数据。
B. 定期测试安全系统和流程。

選項B(定期測試安全系統和流程)也是PCI DSS的一部分,但當提到保護持卡人數據這一特定目標時,加密數據傳輸通常被視為更直接和關鍵的措施。這是因為加密可以直接防止未授權人員在數據傳輸過程中訪問敏感信息。而定期測試安全系統和流程,雖然是重要的安全措施,但它更多地被視為一種確保整體安全態勢有效性的方法,而不是直接針對保護特定數據(如持卡人數據)的措施。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a common document found in the revenue cycle?
A. Packing slip
B. Voucher
C.Bill of materials
D.Bank statement

A

【A》

收入週期 (Revenue Cycle)

常見文件: 裝箱單 (Packing Slip)
描述: 詳細列出發貨物品及其數量的文件,用於發貨時核對。
採購和支付週期 (Purchasing and Disbursement Cycle)

常見文件: 憑證 (Voucher)
描述: 用於記錄採購交易詳情和付款授權的文件。
製造週期 (Manufacturing Cycle)

常見文件: 物料清單 (Bill of Materials)
描述: 列出製造特定產品所需的所有原材料、部件和組件的清單。
財務和報告週期 (Finance and Reporting Cycle)

常見文件: 銀行對賬單 (Bank Statement)
描述: 由銀行提供的文件,列出了特定時間段內賬戶的所有交易記錄和結餘。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sunriss Corp. is trying to minimize its system availability risk by enhancing database redundancy. Lacker only has one location, so it
most likely will employ which of the following practices?
A. Mirroring
B. Network security controls
C. Replication
D.Infrastructure capacity monitoring

A

【1》

复制和镜像主要从存储角度解决冗余问题,因为它们会将数据库复制到备用数据库中。
它们将数据库复制到备用机器上。
虽然复制和镜像都支持数据库冗余,但它们实现冗余的方法不同。镜像涉及将数据库复制到同一站点的不同机器上,而复制还涉及将数据传输到辅助站点的不同数据库中。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which governance system principle under COBIT 2019 is best described as the creation of value for the company’s key groups and key
parties by balancing benefits, risks, and resources?
A. End-to-end governance system
B. Tailored to enterprise needs
C. Dynamic governance system
D. Provide stakeholder value

A

<4>
选择 “D “是正确的。COBIT 2019 的第一条原则 “为利益相关者提供价值 “描述了治理系统应如何通过平衡利益、风险和资源为公司利益相关者创造价值。这应通过精心设计的治理系统与可操作的战略来实现。
选择 “A “不正确。COBIT 2019 的第六项原则 “端到端治理系统 “解释说,组织内涉及信息和技术的所有流程都应组织内涉及信息和技术的所有流程都应纳入治理系统。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shoe-ify Inc. is a new platform that lets companies design shoes based on their customers’ foot shapes and running pronation patterns.
The platform serves as an online marketplace that allows companies’ customers to design shoes, which the company then builds and
sells to the customer. Shoe-ify also provides other turn-key functions such as built-in direct marketing services, payment processing,
and logistics services. This is an example of what type of cloud service provider?
A.Business-Process-as-a-Service
B. Software-as-a-Service
C. Platform-as-a-Service
D. Infrastructure-as-a-Service

A

<2>

用户的主要目的是应用程序本身,而不是开发、管理和维护应用程序的平台。

A. Business-Process-as-a-Service (BPaaS):
代表性例子: ADP(提供人力資源、薪資處理和稅務服務),Salesforce’s CRM (客戶關係管理)。
特點: 提供特定業務流程服務,如人力資源管理、客戶關係管理或會計服務。

B. Software-as-a-Service (SaaS):
代表性例子: Google Workspace(前稱G Suite,提供雲端辦公室應用)、Dropbox(雲存儲服務)、Zoom(視頻會議)。
特點: 終端用戶直接使用的應用程序,不需要本地安裝或維護。

C. Platform-as-a-Service (PaaS):
代表性例子: Heroku、Microsoft Azure、Google App Engine。
特點: 為開發者提供開發、運行和管理應用程序所需的平台和環境。

D. Infrastructure-as-a-Service (IaaS):
代表性例子: Amazon Web Services (AWS) EC2、Microsoft Azure VM、Google Compute Engine。
特點: 提供基礎設施服務,如服務器、存儲和網絡,用戶可以在其上運行任何軟件,包括操作系統和應用程序。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following best describes the compliance requirements design factor under COBIT?
A. Compliance demands on the company can be classified as low, medium, or high, where the medium classification indicates that the organization is typical of its industry.
B. Compliance demands on the company can be classified as low, normal, or high, where the normal classification indicates that the organization is typical of its industry.
C. Compliance demands on the company can be classified as one, two, or three, where the three classification indicates that the organization is typical of its industry.
D. Compliance demands on the company can be classified as one, two, or three, where the two classification indicates that the organization is typical of its industry.

A

<2>
low –>minimal compliance demands,
normal –>typical of its industry,
high –>higher-than-average compliance requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Having an exit strategy for a cloud service provider (CSP) is a response to which of the following risks?
A. CSP violation of service level agreement
B. Unfavorable operational budget variances
C. Favorable regulation changes
D. Lack of application portability (vendor lock-in)

A

<4>

D.缺乏应用程序可移植性(供应商锁定):当企业使用特定 CSP 的服务和基础设施时,就有可能过于依赖该供应商的技术和标准,从而难以转而使用其他供应商的服务或将服务带回企业内部。退出战略对于降低这种风险至关重要,它可以确保企业在必要时从 CSP 转型,而不会造成重大干扰或成本增加。
其他选择的相关性:

A.CSP 违反服务水平协议(SLA):虽然退出战略可以是对违反服务级别协议的更广泛应对措施的一部分,但这里的主要问题通常是通过服务级别协议条款和监控来解决的,而不是退出战略。

B.不利的业务预算差异:预算问题可能会促使对 CSP 安排进行审查,但通常与撤出战略的必要性没有直接关系。

C.有利的监管变化:有利的监管变化通常不会使退出战略成为必要。事实上,这些变化可能会使继续使用 CSP 更具吸引力。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A hedge fund, Pearlin, is a U.S.-based investment company that specializes in what is known as quantamental investing, which
makes stock picks based on algorithms that analyze social media posts, news articles, transcripts from earnings calls, and
various other text-based sources. Pearlin uses a group based out of India who created the software and runs the algorithm
multiple times per day and then sends the results to Pearlin for analysis. This type of business process utilizes:
A. Large language models (LLMs) and insourcing.
B. Robotic process automation (RPA) and offshoring.
C. Outsourcing and natural language processing (NLP).
D. Offshoring and K-means clustering.

A

<3>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Each of the following may be considered a financial implication of a data breach except for which of the following?
A. Litigation expenses to reach resolutions with other impacted parties harmed by the data breach
B. Revenue lost from current and potential customers who will consider competitors due to the negative impact
on the organization’s reputation
C. Communication with vendors temporarily lost due to the data breach, delaying processing of business
activities
D. Regulatory fees imposed on the organization by the government due to the data breach

A

<3>

operational implication rather than a financial implication, since communication may be restored after temporary
downtime and continue without facing a significant financial impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A SOC report would most likely be issued assessing an opinion on the controls of which entity?
A. Independent auditor of the user entity
B. Service auditor
C. Service organization
D. User entity

A

<3>

C= service provider
SOC 报告旨在对服务机构控制措施的有效性提供评估和意见。这些控制措施与该组织向其用户实体提供的服务有关。服务审计师为服务机构而不是用户实体进行审计并出具《标准业务运营证书》报告。

为什么不是 D(用户实体=user):用户实体是使用服务机构所提供服务的组织。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following correctly explains independence requirements for a service auditor performing a SOC
engagement?
A. Independence is required for a SOC 1* and SOC 2” engagement but not for a SOC 3* engagement.
B. Independence is required between the service auditor and the service organization.
C. Independence is required between the service auditor and the user entity.
D. Independence is required for a Type 2 engagement but not for a Type 1 engagement.

A

<2>
The user entity, however, is not part of the SOC audit engagement itself. The service auditor’s independence requirement is in relation to the service organization, not each individual user entity.

service auditor的客戶是service organization而不是user,所以只需要獨立於客戶就可以了

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A high-growth, mid-sized organization that previously used rule-based access controls is seeking additional flexibility to
allow for analysis of theoretical privileges based on actual privileges. What authorization model would be best for this
organization?
A. Role-based access control
B. Risk-based access control
C. Policy-based access control (PBAC)
D. Discretionary access control (DAC)

A

《3》
A. 基於角色的訪問控制 (Role-Based Access Control, RBAC):
例子: 例如,在一家銀行中,柜員和分行經理有不同的訪問權限。柜員可能只能訪問客戶的基本賬戶信息,而分行經理則可以訪問更廣泛的數據和報告。

B. 基於風險的訪問控制 (Risk-Based Access Control):
例子: 例如,訪問敏感財務數據可能需要多因素身份驗證,而訪問普通文檔僅需要密碼。

C. 政策基於的訪問控制 (Policy-Based Access Control, PBAC):
例子: 一家公司可能設定一個政策,允許某些角色的員工在工作時間訪問特定系統,而在非工作時間則受限制。
題目關鍵詞與正確答案的關聯: 題目提到的“分析基於實際權限的理論權限”與PBAC的動態和靈活性相關聯。PBAC能夠基於複雜的條件和規則來決定訪問權限,這為組織提供了所需的靈活性。

D. 自由裁量訪問控制 (Discretionary Access Control, DAC):
例子: 文件的創建者可以決定哪些同事可以查看和編輯該文件。

DAC 更依賴於個別用戶的自由裁量,而 PBAC 則依賴於組織層面預先定義的安全政策。DAC 在某些情況下可能較為靈活,但在保護敏感資料和維護組織級安全標準方面,PBAC 提供了更嚴格和一致的方法。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a weakness of the symmetric encryption method?
A. Symmetric encryption applies an algorithm to transform plaintext into cyphertext.
B. Symmetric encryption limits decoding of cyphertext only by using a key with the mathematically encoded
algorithm to assure that the sender is who they say they are.
C. Symmetric encryption has keys that are generally longer where one is needed for both encryption and
decryption, which impacts speed and operation.
D. Symmetric encryption does not facilitate non-repudiation because any person with the shared key can encrypt
and decrypt messages.

A

<4>

对称加密最有可能的弱点是它不利于不可抵赖性(即保证任何一方都不能否认他们发送或接收了信息),因为任何拥有共享密钥的人都可以加密和解密信息。

非对称加密法(也称公钥加密法)最有利于实现不可抵赖性。在非对称加密中,使用两个不同但在数学上相关的密钥:公钥和私钥。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A declaration made by a payroll processor that states that all sensitive user entity employee information entered into its
system will be kept private and confidential is an example of a:
A. Complementary user entity control.
B. Trust services criterion.
C. Service commitment.
D. System requirement.

A

《3》
A.补充用户实体控制:
定义:用户实体(客户)为补充服务机构的控制而必须实施的控制。
举例说明:一家使用云薪资服务的公司实施自己的内部控制,以确保只有授权人员才能访问薪资系统界面。

B.信任服务标准:
定义:用于评估服务机构控制措施的一套专业标准,尤其是在安全性、可用性、处理完整性、保密性和隐私性方面。
举例说明:云存储提供商应确保其数据中心有健全的安全措施,以防止未经授权的访问,这与 “信任服务标准 “的安全标准是一致的。

C.服务承诺:
定义:服务机构就其服务的某些方面做出的承诺或保证,通常与性能、安全或道德实践有关。
举例说明:工资单处理器声明,输入其系统的所有敏感用户实体雇员信息都将保密。

D.系统要求:
定义:系统必须具备的特定功能或特征,以满足业务需求和监管要求。
举例说明:作为确保账户安全的系统要求的一部分,网上银行系统要求使用多因素身份验证来访问用户账户。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Charles works in the marketing department but has an interest in IT and seeks to model appropriate security behaviors.
Which of the following is the best way for Charles to do this?
A. Charles could issue a security assessment report (SAR) to management on behalf of the marketing department.
B. Charles could lead the effort of implementing a security platform or join a full task force to accomplish those
goals.
C. Charles could unmask data as part of the system development life cycle.
D. Charles could perform a walkthrough of the confidentiality and privacy processes.

A

D. 進行保密性和隱私流程的實地走訪。

這意味著 Charles 將會檢查並確保他和他的部門在處理數據時遵循了安全專業人員設定的最佳實踐和指導方針。這包括了解和遵守公司關於保護敏感信息的政策和程序。

其他選項的簡單解釋:

A. 發布安全評估報告給管理層: 這通常是安全專業人員的工作,而不是市場部門的工作。這涉及到對公司的信息安全狀態進行評估和測試控制。

B. 領導實施安全平台的工作或加入全職小組: 這超出了 Charles 的職責範圍,並且問題中沒有提到 Charles 是否具備實施 IT 安全平台的技能或知識。

C. 對數據進行去遮蔽: 去遮蔽數據通常與數據保護和隱私有關,但這並不是模範安全行為的最佳方式,特別是對於非 IT 專業人員。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which is not one of the three commonly used methodologies for threat models?
A. Process for Attack Simulation and Threat Analysis (PASTA)
В.Spoofing, Tampering, Repudiation, Information disclosure, Denial-of-services attack, and Elevation of privilege
(STRIDE)
C. Evaluating and Processing Information Control (EPIC)
D. Visual, Agile, and Simple Threat (VAST)

A

《3》
选择 “C “是正确的。EPIC 不是威胁模型的真正方法。常用的三种方法是
PASTA、VAST 和 STRIDE 威胁模型。

A. 攻击模拟和威胁分析流程 (PASTA)
В.欺骗、篡改、抵赖、信息泄露、拒绝服务攻击和权限提升 (STRIDE)
C. 评估和处理信息控制(EPIC)
D. 视觉、敏捷和简单威胁(VAST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A service auditor has been engaged to perform a SOC 2* Type 2 engagement by a service organization providing data
storage services. The trust services criteria relevant to the engagement includes security. Management has included
information on a security breach at one location that occurred during the period within its system description. The
service auditor should:
A. Issue an adverse opinion on the SOC engagement as a security breach occurred during the period.
В. Issue an unmodified opinion on the SOC engagement as the security breach is identified.
C. Inquire with management about the controls in place to identify and report a security breach and obtain
evidence.
D. Identify the nature, extent, and timing of the system incident in the service organization’s system description.

A

《3》

C. 與管理層詢問用於識別和報告安全漏洞的控制措施,並獲取相關證據。

這意味著服務審計員需要了解服務組織報告系統失敗、事件和內部或外部用戶的投訴的流程。審計員應該詢問管理層有關識別和報告安全漏洞的控制措施,並通過審查服務組織的文件和董事會會議紀錄等,來獲取支持所披露事件的證據。

其他選項的簡單解釋:

A. 發出不利的審計意見: 這是不正確的,因為僅憑安全漏洞的發生並不能直接決定審計意見應該是不利的。

B. 發出未修改的審計意見: 這也是不正確的,因為光是識別了安全漏洞並不足以決定審計意見。

D. 確定系統事件的性質、範圍和時間: 這是管理層而不是服務審計員的責任。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Each of the following examples would likely be considered personal identifiable information (PIl) used to identify an
individual, except for which of the following?
A. IP addresses of the individual
B. Biometric data of the individual
C. Passport number of the individual
D. Street address of the individual

A

《1》

IP 地址不属于 PII,因为它们经常变化(浮动 IP),或者由几个家庭或个人共享。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A company’s board of directors votes to add an executive position for a chief information security officer who will report
directly to the company’s chief executive officer and oversee a team of individuals dedicated to ensuring that company
systems and information are protected against threats. This action to add an executive position dedicated to security
would be a part of which of the COSO framework components?
A. Risk assessment
B. Control environment
C. Monitoring
D. Control activities

A

《2》
B. 控制環境 (Control Environment):

控制環境是組織內部控制系統的基礎,它包括組織的治理結構、領導態度、員工價值觀和公司文化等元素。這些因素共同形成了組織內部控制的總體氛圍。
在您的情景中,為信息安全創設一個新的高級職位並讓該職位直接向首席執行官匯報,強調了組織對信息安全的重視,這是控制環境的一部分。這顯示了公司高層對於內部控制和信息安全的承諾和重視程度。
D. 控制活動 (Control Activities):

控制活動是指那些具體的政策、程序和機制,用來確保管理層指令得到遵循,並減少風險發生的可能性。這些活動可以包括核准程序、審核、數據驗證和物理或邏輯訪問控制等。
例如,設定系統的定期審計、員工培訓、訪問控制策略的實施等。
The process of background checks on new employees to reduce the risk of fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following is an example of a distributed denial of service (DDOS) attack?
A.Melissa used her computer to execute a script, sending a large number of requests to a target webpage,
causing the target webpage to become unresponsive.
B. David engaged a botnet to overwhelm XYZ Co’s network with traffic with a large number of requests.
C. Jamal used a fake email address to imitate a legitimate employee request.
D. Jennifer created a false online identity in hopes of tricking lonely men into sending her money and gifts.

A

<2>

1–>Melissa used a traditional denial of service (DoS) attack because she only used her computer,
rather than multiple devices. As such, this attack is not distributed.

2–> 利用僵尸网络向 XYZ 公司的网络发送大量请求。【distributed》

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following activities would most likely detect computer-related fraud?
A. Reviewing the systems-access log.
B. Using data encryption.
C. Performing validity checks.
D. Conducting fraud-awareness training.

A

<1>
选择 “A “是正确的。因为与计算机有关的欺诈通常涉及未经授权访问系统和/或数据、
在这些选项中,查看系统访问日志最有可能发现欺诈行为。系统访问日志是一份电子清单,列出谁访问过或试图访问过系统或系统的一部分或数据或数据子集。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following would likely be considered the biggest risk to confidential information when deleting/purging
confidential information from storage devices?
A. When data is removed, using heat to change the chemical construct of data may restrict use or access to the
storage device.
B. When data is removed, physical destruction of storage devices such as the disassembling or changing the
chemical construct of the data may make the device unusable.
C. When data is removed, a residual magnetic flux or imprint may remain on storage devices where tools can
reverse the effects of wiping.
D.
When data is removed, changing the chemical composition of the data through pressure or shredding may
make the device unusable.

A

<3>

企业面临的风险是,在删除数据后,存储设备上可能仍然存在印记或残余磁通量。
数据被删除后,存储设备上可能仍然存在印记或残余磁通量。将存储设备保留在身边,未经授权访问机密信息的风险仍然很高。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is not a primary cybersecurity risk related to Internet of Things (loT)?
A.
Expanded footprint
B.
Escalated cyberattacks
C. Outdated firmware
D. Hybrid management issues

A

《4》

D. 混合管理問題 (Hybrid Management Issues):
這個問題與在使用多種雲端環境時的管理挑戰有關,比如當一家公司同時訂閱多種雲基礎解決方案並/或維護一些現場IT結構時,整合和監控多個環境可能會很困難,這可能使檢測網絡攻擊變得困難。然而,這並不是物聯網特有的風險,而是與使用多個雲環境相關的風險。
其他選項的簡單解釋:

A. 擴展足跡 (Expanded Footprint):

物聯網設備連接到其他設備和公司核心網絡,增加了公司監控的設備總數,從而增加了遭受攻擊的點。
B. 升級的網絡攻擊 (Escalated Cyberattacks):

物聯網設備可能被用作攻擊基地來感染更多設備,或作為進入連接網絡的入口點。
C. 過時的固件 (Outdated Firmware):

攻擊者可以攔截物聯網固件更新或利用已知弱點操縱固件,以獲取設備的訪問和控制權。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following descriptions best describes masking?
A. Masking involves a single shared or private key for encryption and decryption of data within a group where the
key is used by all members in the group.
B. Masking swaps data with other like data so that the original identifying characteristics are disguised while
maintaining a similar structure to the unmodified data set.
C. Masking scrambles unencrypted data using cryptography so that it can generally only be deciphered with a
key.
D. Masking removes production data and replaces it with a surrogate value, in which the data is transformed using mathematical algorithms.

A

《2》

B. 資料遮蔽是將數據與其他類似數據交換,從而使原始數據的識別特徵被掩蓋,同時保持未修改數據集的類似結構。

這意味著在資料遮蔽過程中,數據的原始形態被改變,以便原始數據的識別信息不再直接可見,但數據的整體結構和格式保持不變。這通常用於保護隱私或敏感數據,例如在測試環境中使用生產數據的情況下。

其他選項的錯誤解釋:

A. 描述的是對稱加密,與資料遮蔽無關。
C. 描述的是加密,也與資料遮蔽無關。
D. 屏蔽法删除生产数据,代之以代用值,在代用值中,数据通过数学算法进行转换。
描述的是代幣化(Tokenization),這是另一種數據保護技術,但不同於資料遮蔽。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Pierc has been asked to change the scope of the SOC 1°
engagement from a Type 2 report to a Type 1 report. Which of the following represents language that should be added to
the auditor’s report because of this change?
* A. In our opinion, in all material respects, based on the criteria described in XYZ service organization’s assertion …
the controls related to the control objectives stated in the description were suitably designed to provide
reasonable assurance that the control objectives would be achieved if the controls operated effectively …
B. We did not perform any procedures regarding the operating effectiveness of controls stated in the description
and, accordingly, do not express an opinion thereon.
C. The specific controls tested and the nature, timing, and results of those tests are listed.
D. This report is not intended to be, and should not be, used by anyone other than the specified parties.

A

《2》

B. 我們沒有對描述中的控制措施的運行有效性進行任何程序,因此對其運行有效性不表達意見。

這意味著在類型 1 報告中,審計員需要明確指出他們沒有評估控制措施的實際運行效果。類型 1 報告只對控制措施的設計適宜性(在某一特定時間點)給出意見,而不涉及這些控制措施是否有效地運行。

其他選項的解釋:

A. 這種語言適用於類型 1 和類型 2 報告,因為它們都會對控制設計的適宜性發表意見。
C. 控制測試的具體描述只包含在類型 2 報告中,而不包括在類型 1 報告中。
D. 類型 1 和類型 2 的 SOC 1 報告都是限制使用的,因此這種語言適用於兩種類型的報告。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Each of the following examples would be considered a cybersecurity event except for which of the following?
A. A server receiving a request for a web page
B. A user sending an email communication externally to a client
C. An attacker flooding a web server with requests resulting in a site crash
D. A user connecting to a shared file server

A

《3》

在這些例子中,不被視為網絡安全事件的是:

C. 攻擊者對網絡服務器進行請求洪水攻擊,導致網站崩潰。

這個情況實際上是一種網絡安全事故,因為它涉及到有害的、對企業產生負面影響的行為。這是一種網絡安全事件中的一種:安全事故。

其他選項的解釋:

A. 服務器接收網頁請求: 這是正常的網絡通信,被視為一種網絡安全事件,但通常對企業是無害的。
B. 用戶向客戶發送電子郵件: 同樣,這是正常的網絡通信,被視為網絡安全事件,但通常對企業是無害的。
D. 用戶連接到共享文件服務器: 這也是一種正常的網絡活動,被視為網絡安全事件,但一般情況下對企業是無害的。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Barlings Co. is creating policies and procedures related to data collection. Which of the following options is least likely to be included in these policies and procedures?
A. Incident Response
B. Lifecycle of Personally Identifiable Information (PII)
C. Payroll Best Practices
D. Consequences of Violations

A

在這種情況下,Barlings Co. 作為一家專門為其他企業提供薪酬服務的組織,希望創建與數據收集相關的政策和程序。當開發全面的政策和程序時,其中不太可能包括的選項是:

C. 薪酬最佳實踐 (Payroll Best Practices)

原因如下:
- 薪酬最佳實踐 通常與具體如何處理薪酬相關,這對 Barlings Co.’s 的客戶來說更為重要。而在開發與數據收集相關的政策和程序時,關注的重點應該是如何安全地收集、存儲和處理數據,特別是個人可識別信息 (PII)。

其他選項的解釋:
- A. 事件響應 (Incident Response): 這包括在數據遭受未經授權訪問或其他安全事件時的應對策略,是數據管理政策和程序的重要組成部分。
- B. 個人可識別信息的生命周期 (Lifecycle of Personal Identifiable Information, PII): 這涉及如何在數據的整個生命周期中管理和保護 PII,對於數據收集政策來說至關重要。
- D. 違規後果 (Consequences of Violations): 這是確保數據收集政策得到有效遵守的重要部分,包括對違反政策的處罰。

因此,選項C是不正確的,因為它與數據收集的政策和程序的開發不直接相關。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Unified Auditing Solutions is conducting a SOC 1 Type 2 engagement for Kidell Global Inc., which provides third-party accounting services. Kidell has implemented controls for their general ledger system but did not include these in the system description. What should the service auditor conclude about the exclusion of these controls from the description?
A. The service auditor will likely conclude that such controls are appropriately excluded as the system description
should focus on describing the services and system but not the controls in place at the service organization.
B. The service auditor will likely conclude that such controls should be included in the system description as all
controls at the service organization must be included for the description to be complete.
C. The service auditor will likely conclude that such controls should be included in the system description as they are
designed to help meet control objectives.
D. The service auditor will likely conclude that such controls are appropriately excluded as the controls in place relate
to the service organization rather than the financial processing and reporting of customer transactions.

A

答案是 C:
C.服务审计员应得出结论,这些控制措施应包含在系统说明中,因为它们旨在帮助实现控制目标。

答案:C:

在 SOC 1 类型 2 业务约定中,服务机构的系统描述应包括有关控制目标和实现这些目标的控制措施的信息。
由于 Kidell 总分类账系统的控制措施对准确的财务报告和处理至关重要,而财务报告和处理是 Kidell 提供的主要服务,因此应将其纳入系统描述。
如果将这些关键控制措施排除在外,可能会导致对 Kidell 如何实现其控制目标的理解不完整,而这对 SOC 1 报告的用户来说是至关重要的信息。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Analise works in a lab with valuable intellectual property. To access certain data, she must use a desktop browser on a device physically onsite. Remote or mobile access is not allowed as the database recognizes location and means of access. What authentication technique is this?
A. Biometrics
B. Single sign-on (SSO)
C. Asynchronous tokens
D. Context-aware authentication

A

《4》

A. 生物識別 (Biometrics):

生物識別是利用人體獨特的生物特徵進行身份驗證的技術,如指紋、虹膜掃描、臉部識別等。
例子: 使用指紋掃描器解鎖智能手機。

B. 單一登錄 (Single Sign-On, SSO):
它允許用戶使用一組憑證(如用戶名和密碼)來訪問多個相關的、但獨立的軟件系統或應用程序。SSO的主要好處是提高了方便性和效率,因為用戶無需記住多個憑證或重複登錄不同的系統。
例子: 使用公司的單一登錄憑證來訪問電子郵件、CRM系統和內部網絡。

C. 異步令牌 (Asynchronous Tokens):
異步令牌是一種安全憑證,用於生成一次性使用的密碼或代碼,通常與其他形式的認證一起使用。
例子: 使用銀行發放的安全令牌產生一次性密碼進行網上銀行交易。

D. 情境感知身份驗證 (Context-aware Authentication):
這種身份驗證方法根據用戶的訪問環境(如地點、設備類型、時間等)來決定訪問權限。
例子: 僅允許在辦公室內的特定計算機訪問敏感數據庫。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A critical, high-risk issue related to privilege escalation flaws was identified in a security assessment report (SAR). What
individual or group within the organization is most likely to consider the recommendations in the report and take necessary
actions to remediate them?
A. The centralized incident response team
B. The chief executive officer
C. The General Data Protection Regulation (GDPR) team
D. The Zero Trust Network Architecture team

A

A. 集中式事件響應團隊 (The Centralized Incident Response Team)

這個團隊作為負責管理整個組織跨部門事件的單一事件響應團隊,負責響應和處理安全事件,包括那些在安全評估報告中識別的事件。
他們通常具備技術專業知識和資源,能夠評估安全威脅的嚴重性,並採取適當的修復和預防措施。
其他選項的解釋:

B. 首席執行官 (The Chief Executive Officer): 通常不直接處理技術性的安全問題。這類問題更可能由具有相關技術知識的團隊處理。
C. 通用數據保護條例(GDPR)團隊: GDPR 團隊專注於數據保護法律的遵守,並不直接處理技術安全問題。
D. 零信任網絡架構團隊 (The Zero Trust Network Architecture Team): 零信任網絡架構是一種安全模型,而不是一個具體的團隊或組織結構。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following statements is true regarding the privacy and confidentiality trust services criteria?
A. Privacy and confidentiality ensure information and systems are available for operation and use to meet the entity’s
objectives.
B. Privacy relates to the safekeeping of personal information, whereas confidentiality relates to the safekeeping of a
broader category of sensitive information.
C. Confidentiality relates to the safekeeping of personal information, whereas privacy relates to the safekeeping of a
broader category of sensitive information.
D. Neither privacy nor confidentiality are included within the trust services criteria.

A

B. 隱私涉及個人信息的保護,而保密性則涉及更廣泛類別的敏感信息的保護。

解釋:

隱私 (Privacy): 關注的是個人信息的保護和管理。這包括個人資料的收集、處理、存儲、傳輸和銷毀的方式,以確保個人隱私權不被侵犯。
保密性 (Confidentiality): 涉及保護企業的敏感信息,例如貿易秘密、智慧財產權和商業策略等。這種類型的信息通常不是公開的,並且其披露可能對組織造成損害。
其他選項的錯誤解釋:

A: 說明的是可用性標準,而不是隱私或保密性標準。
C: 說法顛倒了隱私和保密性的定義。
D: 隱私和保密性都是信任服務標準的一部分

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

When implementing layered security, a company’s systems focus on continuous uptime, which requires more emphasis to be placed on which of the following aspects of its IT environment?
A. Assuring that appropriate patches are implemented.
B. Maintaining appropriate written source documents so the data can be re-entered if it is lost or compromised.
C. Reviewing additional expenses to obtain the required amount of business interruption insurance coverage for the
organization.
D. Establishing redundant systems for instant availability to assure the flow of transactions.

A

D. 建立冗餘系統以確保交易流的即時可用性。

解釋:

分層安全是通過使用多樣化的網絡安全保護策略來保護組織的做法。這是通過實施冗餘、多樣化實踐或深層防禦方法來實現的,從而提供多層次的保護。
為了提供持續運行,組織需要更加專注於創建和維護冗餘系統。這樣,如果主要應用程序或硬件失效,用戶將擁有不間斷的服務。
其他選項的錯誤解釋:

A: 雖然補丁有助於保持組織的安全,但它們並不是分層安全中用來提供持續運行的策略。
B: 書面源文件對於支持任何 IT 環境都至關重要,但它們並不是實施分層安全的關鍵組成部分。
C: 獲得業務中斷保險可以賠償公司由於服務中斷而造成的收入損失,但它不會支持 IT 環境以便持續運行。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

When complementary user entity controls are identified during a SOC engagement, the opinion included in the service
auditor’s report should:
A. Include language indicating that the service auditor performed the procedures to test the suitability of the design
and operating effectiveness of the complementary user entity controls necessary, in conjunction with the controls
at the service organization, to provide reasonable assurance related to the achievement of control objectives.
B. Include a disclaimer of opinion.
C. Include language indicating that the suitability of the design and operating effectiveness of the controls to provide
reasonable assurance related to the achievement of control objectives is based upon the assumption that certain
complementary user entity controls were applied and operated effectively during the specified period.
D. Include no reference to complementary user entity controls in the opinion section.

A

C. 包含語言,表明控制措施設計的適宜性和運行效果的評估是基於假設,即某些補充用戶組織控制措施在指定期間內得到了適當的應用和有效的運行。

解釋:

服務審計員報告的意見部分應包含這樣的表述,即意見是基於用戶組織控制措施在整個指定期間內被適當應用並有效運行的假設。
這是因為補充用戶組織控制措施是服務組織控制措施的重要補充,它們的有效性對於實現控制目標至關重要。
其他選項的錯誤解釋:

A: 意見部分不應該表明服務審計員對補充用戶組織控制措施的設計適宜性和運行效果進行了測試。
B: 識別補充用戶組織控制措施並不要求發表免責聲明的意見。
D: 意見部分應包含對補充用戶組織控制措施的提及。意見部分應包含表述,即假設用戶組織控制措施在整個指定期間內得到了適當的應用和有效的運行。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Question: In a SOC engagement, Complementary User Entity Controls refer to which of the following?
A. Controls implemented by the service organization’s management.
B. Necessary controls at a user entity that, combined with service organization’s controls, achieve control objectives in the system description.
C. Controls that are independent and unrelated to the service organization’s controls.
D. Controls solely related to the internal operations of the service organization.

A

Answer: B. Necessary controls at a user entity that, combined with the service organization’s controls, achieve control objectives in the system description.

Key Points:

These controls are vital in combination with the service organization’s controls for meeting specific control objectives.
They are the responsibility of the user entity, not the service organization’s management.
They should be included in the service organization’s system description for clarity and transparency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

In an insurance organization’s actuarial department, what is a risk of using potentially incorrect files manipulated by end users?

A. Management places the same degree of reliance on the manipulated files as they do on files generated directly from its IT system.
B. Management receives limited information for decision making due to a lack of flexibility in end-user files.
C. Management is unable to respond to competitive pressures quickly.
D. Management continues to incur additional cost because it takes more time to do the tasks complying with standard operating procedures.

A

Correct Answer: A. Management places the same degree of reliance on the manipulated files as they do on files generated directly from its IT system.

Explanation:

The correct choice is A because there is a risk that management may incorrectly attribute the same level of credibility to end-user manipulated files as to system-generated data. This can lead to decisions based on potentially erroneous data.
The other choices (B, C, D) do not directly address the specific risk associated with using end-user manipulated files in terms of data integrity and reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which assessment method is Graham least likely to document in the security assessment report for Elige Co.?

A. Analyzing, observing, and reviewing IT security specifications.
B. Reviewing documentation from external financial statement auditors regarding a control deficiency.
C. Having discussions with members of the network administrator team.
D. Performing procedures to compare current password management activities with expected activities.

A

Answer: B

Explanation: Security assessment engagements typically do not evaluate manual financial reporting-related controls, as they are not closely related to IT security.

安全评估业务通常不评估与财务报告相关的人工控制,因为它们与 IT 安全关系不大。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Question: In a SOC engagement using the carve-out method with a subservice organization, what should the service organization’s management exclude from the description of the service organization’s system?

A) The services provided by the subservice organization.

B) The controls in place at the service organization to monitor the effectiveness of the complementary subservice organization controls.

C) The complementary user entity controls necessary.

D) The complementary subservice organization controls.

A

Correct Answer: D) The complementary subservice organization controls.

Explanation: When using the carve-out method in a SOC engagement, the management of the service organization should exclude the complementary subservice organization controls from the description of the service organization’s system. However, they should still identify the services provided by the subservice organization, the necessary complementary user entity controls, and the controls at the service organization for monitoring the effectiveness of the subservice organization’s controls.

 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Question: What is the purpose of a system description documented by the management of a service organization in a SOC 2® engagement?

A) The description provides sufficient information to allow a user auditor to understand how the service organization’s system affects the user entity’s financial statements and is to be prepared in accordance with the trust services criteria.

B) The description provides sufficient information to allow a user auditor to understand how the service organization’s system affects the user entity’s financial statements and assess the risk of material misstatement of the user entity’s financial statements.

C) The description enables report users to understand the system, the processing and flow of data throughout and from the system, and the procedures and controls in place to manage risk.

D) The description enables report users to understand the system, the processing and flow of data throughout and from the system, and the procedures and controls in place to remove any risks related to system performance.

A

Correct Answer: C) The description enables report users to understand the system, the processing and flow of data throughout and from the system, and the procedures and controls in place to manage risk.

Incorrect Answer Explanation:

A) Incorrect. While the description does provide information about the service organization’s system, its primary focus in a SOC 2® engagement is not on how it affects the user entity’s financial statements but rather on the broader aspects of managing risks and processing data.
B) Incorrect. The primary goal of the system description in a SOC 2® engagement is not to assist user auditors in assessing the risk of material misstatement of financial statements but to provide an understanding of the system and its controls.
D) Incorrect. The system description aims to explain the controls in place to manage risk, not to remove all risks related to system performance, which is often not feasible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Here’s an English multiple-choice question card based on the provided content, with a focus on incorrect answers:

Question: Which of the following best describes confidentiality as defined by the National Institute of Standards and Technology (NIST)?

A) The right of a party to maintain control and concealment of information about itself.

B) The removal of production data and replacement with a surrogate value or token, which may be generated using random number generators by hashing.

C) Scrambling of unencrypted data using cryptography so that the data can generally only be deciphered with a key.

D) Preserving authorized restrictions on access and disclosure of data, including means for protecting personal privacy and proprietary information.

A

Correct Answer: D) Preserving authorized restrictions on access and disclosure of data, including means for protecting personal privacy and proprietary information.

Incorrect Answer Explanation:

A) Incorrect. This statement more accurately defines privacy rather than confidentiality as per NIST’s standards.
B) Incorrect. This description refers to tokenization, which is a method used in data security but does not directly define confidentiality.
C) Incorrect. This statement describes the process of encryption, which is a way to ensure confidentiality but is not a definition of confidentiality itself.
正确答案D)保持对数据访问和披露的授权限制,包括保护个人隐私和专有信息的手段。

错误答案: D

A) 不正确。根据 NIST 的标准,这种说法更准确地定义了隐私性而不是保密性。
B) 不正确。该描述指的是标记化,这是数据安全中使用的一种方法,但没有直接定义保密性。
C)不正确。这句话描述的是加密过程,这是一种确保保密性的方法,但不是保密性本身的定义。

49
Q

Question: During a SOC engagement, when complementary user entity controls are identified, how should they be addressed in the opinion section of the service auditor’s report?

A) The report should include language indicating that the service auditor tested the suitability and operating effectiveness of the complementary user entity controls.

B) The report should include language indicating that the effectiveness of the controls is based on the assumption that complementary user entity controls were applied and operated effectively during the specified period.

C) The report should include no reference to complementary user entity controls in the opinion section.

D) The report should include a disclaimer of opinion regarding the complementary user entity controls.

A

Correct Answer: B) The report should include language indicating that the effectiveness of the controls is based on the assumption that complementary user entity controls were applied and operated effectively during the specified period.

Incorrect Answer Explanation:

A) Incorrect. The opinion section of the service auditor’s report should not indicate that the auditor tested the complementary user entity controls.
C) Incorrect. The opinion section should include a reference to complementary user entity controls, stating the assumption of their effective operation during the specified period.
D) Incorrect. The identification of complementary user entity controls does not lead to a disclaimer of opinion; rather, it assumes their effective application in conjunction with the service organization’s controls.

50
Q

General controls in an information system include each of the following, except.
A. Information technology infrastructure.
B. Security management.
C. Software acquisition.
D. Logic tests.

A

Correct Answer: D) Logic tests.
不正确答案解析:

A) 不正确。信息技术基础设施是一般控制的基本组成部分,对组织内控制环境的整体管理和稳定性至关重要。
B) 不正确。安全管理是一般控制的一个重要方面,确保组织的数据和资源免受未经授权的访问和威胁。
C)不正确。软件采购是一般控制的一部分,包括开发、运行和维护过程,以确保软件在信息系统中的可靠性和完整性。

51
Q

Question: In the context of a business impact analysis (BIA) during the risk assessment process, how should an information resource be categorized if an organization can tolerate the loss of this resource for days or possibly a week, yet its eventual restoration is required for continuity?

A) High impact (H).

B) Medium impact (M).

C) Low impact (L).

D) No impact (N).

A

Correct Answer: B) Medium impact (M).

Incorrect Answer Explanation:

A) Incorrect. High impact would imply that the organization cannot tolerate the loss of the resource for even a short period without significant operational disruption.
C) Incorrect. Low impact would indicate that the organization could continue operations for an extended period without the information resource, and its loss would not cause significant disruption.
D) Incorrect. “No impact” is not a recognized category in this context, as all resources will have some level of impact if lost, even if it is minimal.

52
Q

Question: What are a service auditor’s post-report responsibilities regarding the service organization’s system and controls?

A) Must inquire about events after the report date.

B) No procedures or follow-up required after the report date.

C) Must inquire and obtain evidence after the report date.

D) No new procedures required, but must address new relevant facts.

A

Correct Answer: D) No new procedures required, but must address new relevant facts.不需要新的程序,但必须处理新的相关事实。

Incorrect Answer Explanation:

A) Incorrect. Inquiry is required for events before, not after the report date.
B) Incorrect. There is a duty to address new facts that may affect the report.
C) Incorrect. No inquiry or evidence gathering is mandated after the report, unless it impacts the report.

53
Q

Question: When is a service auditor required to maintain independence from a subservice organization in a service organization control report?

A) When the carve-out method is used for the system description.

B) When the inclusive method is used for the system description.

C) Independence is never required from a subservice organization.

D) Independence is always required from a subservice organization.

A

Correct Answer: B) When the inclusive method is used for the system description.

Incorrect Answer Explanation:

A) Incorrect. The carve-out method does not require the subservice organization to be considered a responsible party, hence no independence is needed.
C) Incorrect. Independence may be necessary, specifically when the inclusive method is used.
D) Incorrect. Independence is required based on the method used for the system description, not automatically in all cases.

54
Q

Question: In the NIST Privacy Framework Core Functions, which function is responsible for identifying the company’s privacy risks related to data processing activities?

A) Identify

B) Control

C) Govern

D) Communicate

A

Correct Answer: A) Identify

Incorrect Answer Explanation:

B) Incorrect. The Control function relates to the management of privacy risks, not the identification of them.
C) Incorrect. The Govern function is about establishing governance structures to manage privacy risks, not identifying the risks themselves.
D) Incorrect. The Communicate function deals with how to discuss and share information about privacy risks, not the identification of those risks.

55
Q

Question: Which GDPR principle, defined as ensuring data processing is relevant, adequate, and limited to what is necessary for its purpose, best fits the description?

A) Accuracy

B) Data minimization

C) Integrity and confidentiality

D) Purpose limitation

A

Correct Answer: B) Data minimization

Incorrect Answer Explanation:

A) Incorrect. Accuracy under GDPR means that data must be accurate and kept up to date, not necessarily minimized or limited.
C) Incorrect. Integrity and confidentiality under GDPR refer to secure processing and protection against unauthorized access or damage, not to the scope of data processing.
D) Incorrect. Purpose limitation under GDPR is about processing data for specific, explicit, and legitimate purposes, rather than limiting the scope of the data processed.

56
Q

Question: How does the scope section of a SOC 1 Type 2 report address complementary user entity controls?

A) No mention of complementary user entity controls.

B) Includes evaluation of design and effectiveness of these controls.

C) States that evaluation of these controls was not included.

D) Includes evaluation of design but not effectiveness of these controls.

A

Correct Answer: C) States that evaluation of these controls was not included.

Incorrect Answer Explanation:

A) Incorrect. The report references complementary user entity controls.
B) Incorrect. The report does not evaluate the design and effectiveness of these controls.
D) Incorrect. The report does not evaluate any aspect of these controls.

57
Q

Question: What is the primary focus of risk assessment in all SOC engagements?

A) Inherent risk.

B) Control risk.

C) Detection risk.

D) IT risk.

A

Correct Answer: A) Inherent risk.SOC 工作中的风险评估主要集中于固有风险,或在考虑控制措施之前存在的风险,这些风险会影响系统描述的编制和系统的有效性。

Incorrect Answer Explanation:

B) Incorrect. Control risk relates to control failures, but inherent risk is the primary focus in SOC engagements.
C) Incorrect. Detection risk is about audit failures, whereas SOC engagements focus on inherent risk.
D) Incorrect. IT risk is relevant, but inherent risk, which exists before considering controls, is the primary focus.

58
Q

Question: What is the purpose of quarantining malware in Dave’s endpoint security solution for a health care consortium?

A) Isolating viruses to protect the network, using antivirus software or manual review.

B) Updating software to fix design flaws and cybersecurity risks.

C) Using a firewall to filter traffic and prevent unauthorized network access.

D) Running antivirus scans to detect and compare files to known viruses.

A

Correct Answer: A) Isolating viruses to protect the network, using antivirus software or manual review.

Incorrect Answer Explanation:

B) Incorrect. Updating software (patching) addresses flaws or errors, not the isolation of viruses.
C) Incorrect. A firewall filters traffic for security, which is different from virus quarantining.
D) Incorrect. Antivirus scanning detects viruses; quarantining involves isolating them post-detection.

59
Q

Which of the following programming languages would most likely be used to run queries to retrieve specific subsets
within a data set during data extraction?
A. SQL
B. C++
с. С
D. JavaScript

A

SQL 专为管理和操作关系数据库而设计。它被广泛用于查询数据库以检索特定的数据子集,是数据提取任务中最合适的选择。SQL 允许用户指定所需数据的确切标准,是数据分析和管理的重要工具。

其他选项则不太适合这一特定任务:

B) C++:虽然 C++ 是一种功能强大的通用编程语言,但它并不主要用于数据库查询和数据提取。

C)C:与 C++ 一样,C 也是一种通用编程语言,但不专门用于数据库查询。

D) JavaScript:JavaScript 主要用于网络开发,可以与数据库交互,但不像 SQL 那样直接侧重于数据库查询和操作。

60
Q

Question: Which description best summarizes the holistic approach governance system principle under COBIT 2019?

A) Management activities and governance systems should be clearly distinguished from each other.

B) Governance systems for IT can include diverse components in a holistic model.

C) Governance models should be customized to each company’s needs.

D) A governance system should consider all processes involving information and technology across the organization.

A

Correct Answer: B) Governance systems for IT can include diverse components in a holistic model.

Incorrect Answer Explanation:

A) Incorrect. This describes the principle that governance and management activities are distinct, not the holistic approach principle.
C) Incorrect. This relates to the principle of tailoring governance models to the needs of each company.
D) Incorrect. This is about the end-to-end governance system principle, which encompasses all organizational processes involving information and technology.

61
Q

What are devices called whose primary function is to allow multiple machines in a network to share an IP address, thereby hiding their individual identities?

A) Application-level gateways.

B) Circuit-level gateways.

C) Network address translation firewalls.

D) Software-defined wide-area network (SD-WAN) devices.

A

Correct Answer: C) Network address translation firewalls.
网络地址转换(NAT)防火墙,通常简称为 NAT 防火墙或有状态防火墙,是现代网络安全基础设施的常见组成部分。这些防火墙通过管理内部网络和外部网络(如互联网)之间流量的 IP 地址和端口转换,为网络提供一层保护。

Incorrect Answer Explanation:

A) Incorrect. Application-level gateways inspect packets but don’t primarily assign IP addresses to other network devices.應用實例:在企業網絡中使用,用於實施訪問控制和內容過濾策略,特別是在進行敏感交易和數據交換時。
B) Incorrect. Circuit-level gateways verify data packet sources and are not primarily used for IP address sharing.應用實例:適用於需要快速處理大量數據流,但對數據內容的安全要求不是特別高的場景。例如,它們可以用於控制內部網絡與外部網絡之間的基本流量流動,但不涉及到對數據本身的檢查。
D) Incorrect. SD-WAN devices optimize networks via software and hardware integration but don’t primarily function to share network addresses among multiple devices.

62
Q

Which of the following would most likely be a user of a SOC 1® report?
A. Potential customers of the service organization
B. Potential customers of the user entity
C. The independent auditor of a subservice organization
D. The independent auditor of the user entity

A

选项 D 确实正确。SOC 1®(服务机构控制 1)报告专门用于提供有关服务机构控制措施的信息,这些措施可能会影响用户实体对财务报告的内部控制。因此,SOC 1 报告的主要用户是用户实体的独立审计师。这些审计师依靠 SOC 1 报告来评估服务机构中可能影响用户实体财务报表的控制措施的有效性。

选项 A 和 B 不正确,因为服务机构或用户实体的潜在客户可能会对服务的安全性和可靠性感兴趣,但他们通常不会依赖 SOC 1 报告来获取相关信息。SOC 1 报告主要用于审计和监管目的。

选择 C 也不正确,因为子服务组织的独立审计师可能对服务组织的控制措施感兴趣,但通常会关注自己的审计目标,可能不会直接依赖 SOC 1 报告开展工作。

总之,SOC 1 报告与用户实体的独立审计师最为相关,因此 D 是正确答案。

63
Q

Question: Both a SOC 1* and SOC 2* system description documented by the management of the service organization would contain the following common
components:

A) Services from a subservice entity, trust services criteria, principal service commitments and requirements.

B) Service types, management’s opinion on system design suitability, necessary user entity controls.

C) Service types, trust services criteria, system components for service delivery.

D) Service types, services from a subservice entity, necessary user entity controls.

A

Correct Answer: D) Service types, services from a subservice entity, necessary user entity controls.

Incorrect Answer Explanation:

A) Incorrect. Trust services criteria and principal service commitments are not part of SOC 1.
B) Incorrect. Management’s opinion on system design suitability is not included in SOC descriptions.
C) Incorrect. Trust services criteria and specific system components are not part of SOC 1.

64
Q

An accounts payable clerk is accused of making unauthorized changes to previous payments to a vendor. Proof could be
uncovered in which of the following places?
A. Error reports.
B. Transaction logs.
C. Validated data file.
D. Error files.

A

《b》
選擇C(已驗證的数据文件 Validated data file)不是正确答案的原因在于,已验证的数据文件通常包含已通过编辑和检查的所有交易,以确保它们符合处理标准。这些文件中的交易被认为是有效的,而且通常不会包含有关授权每个交易的个人的详细信息。换句话说,这些文件重点在于交易本身的有效性,而不是谁进行了交易或是否有未授权的更改。

相比之下,交易日志(选项B)记录了所有处理过的交易,包括对供应商付款的更改。交易日志不仅记录交易本身,还记录了执行交易的个人的身份信息,因此它们可以用来追踪未授权的更改和确定责任人。这就是为什么在这种情况下,交易日志是确定是否有未授权的账户更改的最佳来源。

65
Q

Question: In a business impact analysis (BIA), how would a resource be classified if it involves significant recovery cost but allows the organization to function partially for a limited time?

A) Low-impact only (L)

B) Moderate-impact only (M)

C) High-impact (H) to moderate-impact (M)

D) Moderate-impact (M) to low-impact (L)

A

Correct Answer: C) High-impact (H) to moderate-impact (M)

Incorrect Answer Explanation:

A) Incorrect. Low-impact resources typically can function for a longer period when damaged and don’t incur significant recovery costs.
B) Incorrect. Moderate-impact resources allow partial functioning but don’t usually involve significant recovery costs.
D) Incorrect. This combination doesn’t align with significant recovery costs, which is a key aspect of the scenario described.

66
Q

Hi Tech Corporation is a California based company that has contracted with a separate company in India to handle its
customer service call center. Hi Tech Corporation’s practice is most accurately described using the term:
A. Shared services.
B. Offshore operations.
C. Outsourcing.
D. Globalization.

A

《2》

Offshore Operations (選項B): 此術語專指將業務服務或功能外包給位於不同國家的公司或實體。在這個例子中,Hi Tech Corporation將其客戶服務中心的運營外包給了印度的一家公司。因此,這被視為“海外運營”(Offshore operations),重點在於服務是在公司所在國家以外的地方進行。

Outsourcing (選項C): Outsourcing通常指的是將某些業務過程或服務委託給外部公司或組織進行,不論這些外部公司或組織是否位於同一國家。Outsourcing是一個更廣泛的概念,包括了在同一國家(onshore outsourcing)和不同國家(offshore outsourcing)的外包。

總的來說,選項C(Outsourcing)描述的是一種更一般的外包行為,而選項B(Offshore Operations)更具體地指出了這種外包是跨國的。在Hi Tech Corporation的情況中,由於外包服務是在美國以外的國家(印度)提供的,因此“海外運營”是一個更準確的描述。

67
Q

In which cyberattack stage do the attackers discover and collect as much information about the target IT system as
possible?
A. Intel gathering
B. Research
C. Espionage
D. Reconnaissance

A

《4》
侦察(Reconnaissance): 在这个阶段,攻击者收集关于目标的信息,包括网络布局、系统漏洞、可用的安全措施、员工信息等。这是规划攻击的初步阶段。

武器化(Weaponization): 攻击者创建或获取用于攻击的恶意软件(如病毒、蠕虫、特洛伊木马)。

传送(Delivery): 攻击者将恶意软件传送到目标网络中。这可能通过电子邮件、网络、USB设备等方式实现。

利用(Exploitation): 恶意软件在目标系统上激活,利用存在的漏洞进行攻击。

安装(Installation): 恶意软件在受害者的系统上安装自己,确保持续控制。

命令和控制(Command and Control, C2): 攻击者建立一个与恶意软件通信的远程控制通道,以控制受害者的系统。

行动(Actions on Objectives): 最后,攻击者实现其目标,可能是数据窃取、系统破坏、勒索或其他恶意活动。

68
Q

Each of the following stages within the data life cycle is likely considered a necessary stage except:
A. Preparation.
B. Capture/Creation.
C. Purging.
D. Synthesis.

A

<D>

数据创建/捕获(Capture/Creation): 这是数据生命周期的开始,数据被创建或捕获。这可能包括收集新数据,如用户输入,或从外部源捕获数据。

数据准备(Preparation): 在这个阶段,数据被清洗和整理,以便于分析和处理。这可能包括数据的标准化、清理、去重、加密和转换。

数据输入/存储(Input/Storage): 数据被保存在数据库或其他存储系统中,以便于未来的访问和分析。

数据处理(Processing): 数据被处理或转换,以支持业务决策和其他应用。这可能包括排序、聚合、计算等操作。

数据分析(Analysis): 在这个阶段,数据被分析以提取洞察力。这可能包括统计分析、预测建模、报告等。

数据共享/发布(Sharing/Distribution): 数据被共享或发布给需要使用这些数据的用户或系统。

数据使用(Usage): 数据被实际应用于业务流程、决策支持或其他目的。

数据保管(Maintenance): 在这个阶段,数据会进行定期的维护和更新,以确保其准确性和相关性。

数据清除/净化(Purging): 最终,当数据不再需要时,它会被从存储系统中彻底删除或净化。
</D>

69
Q

Here’s a simplified English multiple-choice question card focusing on the incorrect answers based on the provided content:

Question: In a SOC 2 Type 2 engagement for Pay Right Processing Inc., how should the service auditor’s report describe the tests of controls conducted by the internal audit?

A) The internal audit’s tests included inquiry, inspection, and reperformance, but the service auditor cannot assure adherence to standards.

B) The report should not mention the internal audit’s work.

C) The internal audit’s tests included inquiry, inspection, and reperformance. The service auditor reperformed some tests and found no exceptions.

D) The internal auditor assisted in tests of controls, but the service auditor did not perform additional procedures.

A

Correct Answer: C) The internal audit’s tests included inquiry, inspection, and reperformance. The service auditor reperformed some tests and found no exceptions.

Incorrect Answer Explanation:

A) Incorrect. While internal audit’s work is described, the second sentence about limitations is not appropriate.
B) Incorrect. Reference to the internal audit’s work is required in the report.
D) Incorrect. The report should include both a description of the internal audit’s work and the service auditor’s procedures concerning this work.

70
Q

The trust services categories include:
A. Authorization, controls, processing efficiency, processing integrity, and security.
B. Authorization, confidentiality, privacy, processing efficiency, and service.
C. Availability, confidentiality, privacy, processing integrity, and security.
D. Availability, controls, privacy, processing integrity, and service.

A

想象一个公司名为 “CAPPS Technologies”,他们专注于数据的安全和完整性。公司的每个字母代表了他们的核心价值:

C (Confidentiality): CAPPS Technologies 的首要任务是确保客户数据的保密性。他们像保护国家机密一样保护每位客户的信息。

A (Availability): 客户随时都能访问他们的数据,这就是可用性的承诺。无论何时何地,CAPPS Technologies 都确保其系统始终可访问、始终在线。

P (Processing Integrity): 数据处理的完整性是公司的核心。无论是数据的输入、处理还是输出,CAPPS Technologies 都确保一切准确无误。

P (Privacy): 对于隐私的尊重贯穿于公司的所有操作中。CAPPS Technologies 保证个人信息的保护,确保客户的隐私安全。

S (Security): 最后,安全性是公司的基石。他们使用最先进的技术来保护系统免受任何威胁。

71
Q

Why should a company consider switching to cloud computing?

A) Reduces upfront and maintenance costs.

B) Ensures the best security for sensitive information.

C) Offers superior program modification options.

D) Accessible only through the company’s Intranet.

A

Correct Answer: A) Reduces upfront and maintenance costs.

Incorrect Answer Explanation:

B) Incorrect. While secure, cloud computing involves entrusting data to a third-party provider.
C) Incorrect. Program modification in cloud computing depends on the service provider, which may not always be flexible.
D) Incorrect. Cloud computing is accessible over the Internet, not limited to an Intranet.

72
Q

Question: In a SOC 2 engagement, where in the service auditor’s report should the reasons for an adverse opinion be detailed?

A) In the scope section.

B) In a separate paragraph before the opinion paragraph.

C) In the service auditor’s responsibility section.

D) In the inherent limitations section.

A

Correct Answer: B) In a separate paragraph before the opinion paragraph.在SOC 2报告中,将导致不利意见的具体原因放在单独的段落而不是直接放在意见段落(Opinion Paragraph)的原因是为了清晰性和强调

Incorrect Answer Explanation:

A) Incorrect. The scope section does not change for an adverse opinion.
C) Incorrect. While this section references the adverse opinion, it doesn’t detail the reasons for it.
D) Incorrect. The inherent limitations section is standard and does not include reasons for an adverse opinion.

73
Q

An enterprise resource planning system is designed to:
A. Present executives with the information needed to make strategic plans.
B. Automate the decision-making process.
C. Allow nonexperts to make decisions about a particular problem.
D. Integrate data from all business functions across departments.

A

Correct Answer: D) To integrate data across all business functions and departments.

Incorrect Answer Explanation:

A) Incorrect. While ERP systems provide integrated information, they are not primarily for delivering strategic information to executives.
B) Incorrect. ERP systems assist in decision-making but do not automate it.
C) Incorrect. ERP systems require a sophisticated understanding and do not specifically target nonexpert decision-making.

74
Q

Question: What should be included in management’s description of an entity’s cybersecurity risk management program?

A) Details of the governance structure, risk assessment process, control processes, and a list of all past cybersecurity breaches.

B) The service auditor’s responsibility in establishing and maintaining the cybersecurity risk management program.

C) The business nature, information at risk, and details on the cybersecurity governance structure.

D) Information about the cybersecurity risk management programs of the entity’s direct competitors.

A

Correct Answer: C) The business nature, information at risk, and details on the cybersecurity governance structure.

Incorrect Answer Explanation:

A) Incorrect. A list of all past cybersecurity breaches is not required in the description.
B) Incorrect. The description should focus on management’s responsibility, not the service auditor’s role.
D) Incorrect. Information about competitors’ cybersecurity programs is not required.

75
Q

Question: What should be included in management’s description of the entity’s cybersecurity risk management program?

A) Cybersecurity governance, risk assessment, control processes, and a list of past breaches.

B) Service auditor’s responsibility in maintaining the cybersecurity program.

C) Business nature, information risk, and cybersecurity governance structure.

D) Cybersecurity programs of the entity’s direct competitors.

A

Correct Answer: C) Business nature, information risk, and cybersecurity governance structure.

Incorrect Answer Explanation:

A) Incorrect. A detailed list of past breaches is not required in the description.
B) Incorrect. The description should focus on management’s responsibility, not the service auditor’s.
D) Incorrect. Information on competitors’ cybersecurity programs is not a requirement.

76
Q

Question: Why did Brown Corporation’s general counsel recommend implementing operational safeguards and security controls?

A) To avoid potential litigation and monetary losses due to data breaches.

B) To maintain a favorable corporate image compared to competitors.

C) To prevent network connectivity slowdowns for employees.

D) To reduce the risk of physical asset theft by customers and employees.

A

Correct Answer: A) To avoid potential litigation and monetary losses due to data breaches.

Incorrect Answer Explanation:

B) Incorrect. While image concerns are valid, the primary reason is to avoid litigation and financial loss.
C) Incorrect. Network connectivity issues are less of a concern than legal and financial risks.
D) Incorrect. The focus is on data protection rather than physical asset theft.

77
Q

Question: Bret is documenting Cloverleaf Designs’ expenditure cycle with a focus on the logical data flow. Which technique should he use?

A) Process narrative.

B) Data flow diagram.

C) System interface diagram.

D) Flowchart.

A

Correct Answer: B) Data flow diagram.
keyword: logical(visual)

Incorrect Answer Explanation:

A) Incorrect. Narratives describe processes in writing, not visually.
C) Incorrect. System interface diagrams are for client-system interfacing, not for logical data flow.
D) Incorrect. Flowcharts depict both logical and physical data flows.

78
Q

Question: Under NIST SP 800-53, which control family specifically deals with delivering instructional material on information security risk?

A) Planning.

B) Awareness and Training.

C) Risk Assessment.

D) Personnel Security.

A

Correct Answer: B) Awareness and Training.

Incorrect Answer Explanation:

A) Incorrect. Planning involves managing information security planning, not specifically instructional material delivery.
C) Incorrect. Risk Assessment deals with assessing environmental risks, not training material.
D) Incorrect. Personnel Security evaluates employee-related security risks, not training and awareness.

79
Q

Question: In which environment do software engineers typically perform the final phases of evaluation before deploying a new product prototype?

A) Testing.

B) Staging.

C) Development.

D) Production.

A

Correct Answer: B) Staging.

software development life cycle
1. development,
2. testing,
3. staging,
4. production
5. disaster recovery

Incorrect Answer Explanation:

A) Incorrect. The Testing environment is used for initial testing and debugging, not the final evaluation before deployment.
C) Incorrect. The Development environment is where prototypes are initially created and developed, not the final evaluation stage.
D) Incorrect. The Production environment is where the application is live and deployed, not for pre-deployment evaluation.

80
Q

Question: What type of attack did Sarah use when she tried to gain access to a facility by appearing pregnant and carrying heavy bags, hoping someone would let her in without scanning a keycard?

A) Cross-site scripting (XSS).

B) Man-in-the-middle (MITM) attack.

C) Host-based attack.

D) Social engineering.

A

Correct Answer: D) Social engineering.

Incorrect Answer Explanation:

A) Incorrect. XSS involves injecting malicious code into websites, not manipulating people for physical access.
B) Incorrect. MITM attacks involve intercepting communications between two parties, not physical entry manipulation.
C) Incorrect. Host-based attacks target specific devices, not gaining physical access through deception.

81
Q

Which CIS Control best describes the prevention or control of the installation, spread, and execution of malicious
applications, code, or scripts on enterprise assets?
A. Control 12: Network Infrastructure Management
B. Control 10: Malware Defenses
C. Control 15: Service Provider Management
D. Control 16: Application Software Security

A

Correct Answer: B) Control 10: Malware Defenses.

A) Incorrect. Control 12 focuses on managing network devices to prevent exploitation, not directly on malware.
C) Incorrect. Control 15 involves evaluating service providers for data protection, not malware control.
D) Incorrect. Control 16 is about managing the security of software, not specifically targeting malware prevention.

82
Q

Question: In a SOC 2 engagement, which statement is true regarding service commitments and system requirements?

A) System requirements may result from service commitments related to trust services categories.

B) Service commitments can lead to specific system requirements and are related to trust services categories.

C) Management must disclose all service commitments and system requirements to users.

D) Service commitments and system requirements are established by the service auditor.

A

Correct Answer: B) Service commitments can lead to specific system requirements and are related to trust services categories.
服务承诺是向用户实体做出的关于用于提供服务的系统的声明,而服务要求则是关于系统应如何运行才能满足服务机构的服务承诺的说明。

Incorrect Answer Explanation:

A) Incorrect. It’s the service commitments that may lead to system requirements, not the other way around.
C) Incorrect. Management only needs to disclose principal service commitments and system requirements relevant to SOC 2 report users.
D) Incorrect. Service commitments and system requirements are established by management, not the service auditor.

83
Q

Which of the following would best provide a detailed and structured review of program logic?
A. Direct conversion
B. Walk-through
C. Acceptance
D. Test data processing

A

Explanation
Choice “B” is correct. A walk-through of a program allows the company to gain an understanding of the program logic,
design philosophy, features, functionality, etc.
Choice “A” is incorrect. The answer does not provide context of direct conversion and, therefore, does not provide
information on the program logic.
Choice “C” is incorrect. Acceptance of the program does not provide information on the program logic.
Choice “D” is incorrect. Test data processing is used to confirm if the program is producing expected results. It does not
involve a review of the program logic (how the program processes the information).

84
Q

each of the following describe how the NIST Privacy Framework helps organizations manage privacy except for which of
the following?
A. Communicating privacy practices to the rest of the organization
B. Encouraging cross-organizational workforce collaboration relating to user privacy and IT security
C. Considering privacy best practices as they design and deploy systems, products, and services that affect
individuals
D. Reducing personal information gathered to the minimum necessary for critical business functions

A

Correct Answer: D) Minimizes the collection of personal information to what’s necessary for business functions.

Incorrect Answer Explanation:

A) Incorrect. The NIST Privacy Framework aids in communicating privacy practices organization-wide.
B) Incorrect. The Framework encourages collaboration relating to privacy and IT security.
C) Incorrect. It emphasizes considering privacy best practices in system design and deployment.

NIST隐私框架的主要目的是帮助组织以一种整体和风险管理的方式来处理隐私问题。它强调在设计和实施各种影响个人隐私的系统、产品和服务时考虑和融入隐私最佳实践。这意味着C选项实际上是NIST隐私框架的一个重要组成部分。

而D选项,虽然强调了减少收集个人信息的重要性,这在隐私保护中确实是一个关键考虑因素,但它更直接地与数据最小化原则相关,这通常被视为隐私保护的一部分,而不是NIST隐私框架的主要功能或重点。NIST隐私框架更多地关注于如何在组织层面上管理和缓解隐私风险,而不是仅仅局限于最小化数据收集。因此,D选项不像其他选项那样直接描述了NIST隐私框架的应用方式。

85
Q

Question: What is the purpose of disclosing relevant complementary user entity controls in a SOC engagement?

A) To ensure absolute assurance that control objectives are met.

B) To help report users understand user entity controls necessary for reasonable assurance of control objectives.

C) To shift responsibility for control objectives from the service organization to the user entity.

D) To inform about subservice organization controls necessary along with the service organization controls for reasonable assurance of control objectives.

A

Correct Answer: B) To help report users understand user entity controls necessary for reasonable assurance of control objectives.

Incorrect Answer Explanation:

A) Incorrect. Absolute assurance cannot be guaranteed in SOC engagements.
C) Incorrect. The purpose is not to shift responsibility but to provide understanding of necessary controls.
D) Incorrect. This answer confuses complementary user entity controls with those of a subservice organization.

选择D (“向报告用户说明子服务组织必须实施的控制,与服务组织的控制结合,以提供对控制目标达成的合理保证”) 不正确的原因在于,这个选项混淆了“补充用户实体控制”和“补充子服务组织控制”这两个概念。

在SOC(Service Organization Control)报告中,补充用户实体控制(Complementary User Entity Controls)是指那些用户实体(即服务组织的客户)必须实施的控制措施,这些控制措施与服务组织的控制措施结合使用,以确保达成控制目标。这些控制措施是必要的,因为服务组织的控制措施可能无法独立地满足所有控制目标。

而补充子服务组织控制(Complementary Subservice Organization Controls)则是指服务组织依赖的子服务组织(如第三方供应商)必须实施的控制措施。这些控制措施与服务组织自身的控制措施结合使用,以确保控制目标的达成。

86
Q

Which of the following represents a best practice in patch management?
A. Deploy a patch in production and use a vulnerability tool to evaluate its performance.
B. Evaluate new patches and test in a non-production environment.
C. Verify that a patch has been deployed and then test it in a non-production environment.
D. Apply a patch as a pilot in a production environment and proceed if the pilot is successful.

A

B正確

选择A (“在生产环境部署补丁并使用漏洞工具评估其性能”) 不是补丁管理的最佳实践的原因在于:

风险管理: 直接在生产环境中部署未经测试的补丁可能导致系统不稳定或出现新的安全漏洞。这种做法可能会给生产环境带来不必要的风险,特别是在关键的业务系统中。

测试的重要性: 在将补丁应用到生产环境之前,在非生产环境中对其进行评估和测试是一种常见的最佳实践。这允许组织评估补丁可能引入的问题或与现有系统的兼容性问题,而不会影响实际的业务操作。

使用漏洞工具的时机: 漏洞工具通常在补丁部署之前用于识别需要修补的漏洞,而不是用于补丁部署后评估补丁的性能。补丁管理的目标是在不影响生产系统的情况下,安全地修复已知的安全问题。

87
Q

What should a company do when seeking competitive advantages in planning for the implementation of a new software
system?
A. Design the software to fit the existing processes.
B. Allow management to dictate processes.
C. Design an optimal process and then align the software.
D. Direct manpower to the non-bottleneck process areas.

A

公司在规划实施新软件系统时,应如何寻求竞争优势?
系统?
A. 设计适合现有流程的软件。
B. 让管理层决定流程。
C. 设计最佳流程,然后调整软件。
D. 将人力导向非瓶颈流程领域。
说明
选择 “C “是正确的。实施新软件往往是一个很好的机会,不仅可以评估软件的
功能,还可以重新审视并最终优化流程,使其与软件相匹配。

88
Q

Which of the following best describes the overview of CIS Control 04: Secure Configuration of Enterprise Assets and
Software?
A. Establish and maintain the secure configuration of both software and assets within the enterprise.
В. Improve protections and detections of digital threats such as email and web vectors.
C. Actively manage all software on the network to prevent unmanaged software from installation or execution.
D. Use processes and tools to create, assign, manage, and revoke access credentials and privileges for enterprise
assets and software.

A

Correct Answer: A) Ensuring secure configurations for both software and assets within the enterprise.

Incorrect Answer Explanation:

B) Incorrect. Control 09 focuses on protecting against and detecting threats from email and web vectors, not on secure configurations.
C) Incorrect. Control 02 deals with the active management of software to ensure only authorized software is used, separate from secure configurations.
D) Incorrect. Control 06 involves managing access credentials and privileges, which is different from establishing secure configurations of assets and software

89
Q

Question: For a client with a restricted budget, minimal daily data generation, but a need for quick data restoration from a single file in case of system failure, which backup method is most suitable?

A) Combination of incremental and full backup.

B) Incremental backup only.

C) Full backup only.

D) Differential backup.

A

Correct Answer: C) Full backup only.

Incorrect Answer Explanation:

A) Incorrect. The combination increases complexity and cost, which is not ideal for the client’s need for simplicity and budget constraints.
B) Incorrect. Incremental backups, while efficient for daily changes, require a longer restoration time as all changes since the last full backup must be applied.
D) Incorrect. Differential backups might offer a quicker restoration than incremental backups but are not as efficient as a full backup for the client’s specific needs.
每日生成的数据有限: 客户每天增加的数据量很少,从而降低了在两次备份之间丢失大量数据的风险。
成本考虑: 虽然完全备份更耗时、更耗资源(因此成本更高),但客户希望快速恢复数据,因此完全备份是合理的。
偏好快速恢复: 客户需要在系统故障时快速恢复,因此完整备份更可取,因为它们可以从单一文件恢复,简化并加快了恢复过程。
在权衡成本与快速、直接恢复数据的需求后,得出了完整备份是该客户最佳选择的结论。

90
Q

Based on the provided information, here’s a simplified English multiple-choice question card focusing on the incorrect answers:

Question: What is the focus of the analytics and usage stage of the data life cycle?

A) Ensuring data is complete, clean, current, encrypted, and user-friendly.

B) Making the data useful internally within the organization.

C) Moving data from active to passive systems to reduce security risks.

D) Sharing data with external users, losing sole control over its usage.

A

Correct Answer: B) Making the data useful internally within the organization.

Incorrect Answer Explanation:

A) Incorrect. This describes the preparation stage, where data is made ready for analysis.
C) Incorrect. This pertains to the archival stage, where data is stored for long-term preservation.
D) Incorrect. This describes the publication stage, where data is made available to external parties.

91
Q

Which of the following components of a governance system can be best described as a set of activities or practices that
produce outputs that help achieve overall information technology goals?
A. Principles, policies, frameworks
B. Information
C. Organizational structures
D. Process

A

选择 “D”(流程)是正确的。管理系统中的流程指的是为实现信息技术总体目标而产生产出的一系列活动或实践。流程对于有效实施管理系统的原则、政策和框架至关重要。它们可确保采取行动实现预期成果,并确保这些行动与组织的战略目标保持一致。

A(原则、政策和框架): 这些原则、政策和框架为 IT 治理系统的运行提供了总体方向和界限,但不是活动或实践本身。

B(信息): 信息是治理系统内决策的关键资产,但并不描述活动或实践。

C(组织结构): 组织结构定义了治理系统内的角色、职责和报告关系,但并不直接描述旨在实现 IT 目标的一系列活动。

流程是将管理原则付诸实施、执行政策和实现战略目标的机制,因此选项 “D “是本题的最佳答案。

92
Q

Question: What criteria must a vendor meet to be considered a subservice organization by a service organization?

A) The vendor’s services are necessary for system commitments, as determined by the service auditor.

B) The vendor’s controls, independently, must assure the system commitments and service requirements are met.

C) The vendor’s services and controls are necessary, in combination with the service organization’s controls, for system commitments and service requirements.

D) The vendor must be a separate external entity, and its controls must work with the service organization’s to ensure system commitments and service requirements.

A

Correct Answer: C) The vendor’s services and controls are necessary, in combination with the service organization’s controls, for system commitments and service requirements.

Incorrect Answer Explanation:

A) Incorrect. It’s the service organization’s responsibility, not the service auditor’s, to determine the necessity of a vendor’s services.
B) Incorrect. Vendor controls need to be considered in combination with the service organization’s controls, not independently.
D) Incorrect. A vendor does not need to be a separate external entity; related entities can also serve as subservice organizations.

93
Q

Question: During a SOC 2 Type 2 engagement for a payroll processing company, Rathway Audit Consultants identified concerns about the competency of the team performing final reviews. This concern most directly impacts which of the following areas?

A) Monitoring activities negate the need for team competency.

B) The design of the controls regarding the final review process.

C) The implementation of the controls by the payroll processing team.

D) The accuracy of the service organization’s description of the system.

A

Correct Answer: B) The design of the controls regarding the final review process.

Incorrect Answer Explanation:

A) Incorrect. The competency of the team is crucial for the effectiveness of controls, despite ongoing monitoring activities.
C) Incorrect. While implementation is important, the core issue lies in the control design, which must account for team competency.
D) Incorrect. Concerns about team competency primarily affect the design of controls rather than the system’s description accuracy.

94
Q

Which of the following is not one of the most common cyberattack stages?
A. Escalation of privileges
B. Perform reduction analysis
C. Maintaining access
D. Reconnaissance

A

选择 “B “是正确的。进行还原分析是威胁建模的一个阶段,而不是网络攻击的一个阶段。
网络攻击的常见阶段是侦察、获取访问权、权限升级、保持访问权、
网络开发和渗透,以及掩盖踪迹。
选择 “A “是错误的。一旦获得未经授权进入系统的权限,攻击者就会在这一阶段尝试获得更高级别的权限。这可以通过获取具有更高权限的用户的凭证来实现。
选择 “C “不正确。一旦获得未经授权的系统访问权限,并且权限已经升级,就必须保持访问权限。在这一阶段,攻击者会在系统中持续停留一段时间,直到攻击完成,并寻找其他方法延长访问时间或稍后返回。

95
Q

1.What is the trust services category that is addressed in most trust services engagements?

2.The entity tests its recovery plan procedures to ensure system recovery meets entity objectives. This is an additional specific criteria related to which of the trust services categories?

  1. Wans Co. processes payroll for its customers and has discovered a potential security breach involving customer employee data. Which trust services category does the process of evaluating the impact of this breach fall under?

A. Privacy
B. Security
C. Confidentiality
D. Availability

A

1.安全性(Security):

安全性是被广泛关注的一个核心领域,涉及保护信息和系统免受未经授权的访问、披露、篡改、破坏或失去的风险。
它是大多数信托服务评估中唯一必须被涉及的类别,因为组织及其客户和业务伙伴对技术的依赖不断增加,对网络安全风险及其对操作流程的影响感到担忧。

  1. Availability
    An entity’s testing of a recovery plan is related to ensuring the system remains available for use to
    help an entity to meet its objectives. This is an additional specific criterion related to the availability trust services
    category.
  2. privacy
    “evaluate the impact of the potential breach”(評估潛在漏洞的影響) - 這強調了對於受影響個人資料的隱私保護的重要性,即評估如何處理、使用、保存、披露和處置這些資料。
96
Q

An enterprise resource planning (ERP) system has which of the following advantages over multiple independent
functional systems?
A. Integration is less costly.
B. The time to implement an ERP system is significantly less.
C. ERP systems are more cost effective.
D. Data input is less intensive because a central repository is used.

A

《4》
数据中心化存储:ERP系统的一个关键优势是数据存储在中央仓库中。这意味着数据只需输入一次,而不是在独立的功能系统中多次重复输入。这种中心化的数据管理减少了数据不一致的风险,提高了报告的准确性,并简化了数据管理。

97
Q

Which of the following activities would fall within the Performance component of the COSO Integrating with Strategy
and Performance Framework?
A. Prioritizing risk
B. Reporting on risk
C. Defining risk appetite
D. Reviewing risk and performance

A

《1》
The Performance component of the COSO Enterprise Risk Management (ERM) - Integrating with Strategy and Performance Framework focuses on how organizations can effectively manage risk to achieve their performance and profitability goals while adhering to their defined risk appetite.
Identifying Risk (Principle 10)識別
Assessing the Severity of Risks (Principle 11)評估嚴重性
Prioritizing Risk (Principle 12)確立優先次序
Implementing Risk Responses (Principle 13)實施風險應對
Developing a Portfolio View of Risk (Principle 14)制定風險組合

98
Q
  1. Suzie, the Senior Accounting Director for her organization, is working with the IT department on a business impact
    analysis (BIA). They are determining the optimal maximum tolerable downtime (MTD) and the mean time to repair (MTTR)
    for the company’s general ledger software should an outage occur. In which of the following BIA steps would this occur?
    A. Define disruption impacts.
    B. Estimate losses.
    C. Identify critical resources.
    D. Establish recovery priorities.

Elitado Manufacturing’s CFO is working on calculating the annualized rate of occurrence (ARO) and the annualized loss
expectancy (ALE) for a business impact analysis (BIA) being performed by its IT department. At which of the following steps
during the BIA would this occur?

A. Define disruption impacts.
B. Estimate losses.
C. Identify critical resources.
D. Establish recovery priorities.

A

《4》
《2》

1) 确立BIA方法论
指标和活动: 确定BIA的范围、关键参与者、所需数据收集方法(如调查、访谈、工作坊)。制定明确的时间表和责任分配。
关键活动: 制定BIA项目计划,包括关键里程碑和交付物。
2) 识别关键资源
指标和活动: 列出并分类关键业务流程。对每个业务流程识别支持的技术、人员、第三方服务和其他必要资源。
关键活动: 使用工具或模板来记录和评估每项资源对业务运作的重要性。
3) 定义中断影响
指标和活动: 使用影响等级( (such as low, medium, high)如低、中、高)来评估中断对业务流程的影响。考虑中断对客户服务、合规要求、财务影响和市场声誉的影响。
关键活动: 进行影响评估分析,包括定性和定量分析,如每小时的营业损失估算。
4) 估计损失
指标和活动: 计算不同中断时长(如1天、1周、1月)的直接和间接财务损失。评估中断对客户满意度和长期合约的潜在影响。
关键活动: 创建损失矩阵,关联每个关键资源的停机时间与预期损失。
5) 建立恢复优先级
指标: 最大可容忍停机时间(MTD)和平均修复时间(MTTR)。
活动: 为每个关键业务流程和资源设置MTD和MTTR,确保它们反映了组织的风险胃纳。开发恢复时间目标(RTO)和恢复点目标(RPO)。
6) 创建BIA报告
指标和活动: 将BIA过程的发现汇总成一份报告,包括关键资源列表、影响和损失估计、恢复优先级以及建议的改进措施。
关键活动: 报告应清楚地定义每项建议的实施步骤、预期成本和预期效益。
7) 实施BIA建议
指标和活动: 根据BIA报告的建议,制定行动计划和时间表。分配资源并监控实施进度。
关键活动: 实施关键改进措施,如加强数据备份和恢复能力、改进关键资源的冗余配置、开展员工培训和进行恢复演练。

99
Q

Which of the following is an example of a mobile code cyberattack?
A.Elliott transmits data by modifying a storage location, allowing another party with lower security permission to
access the data.
B. Owen overloads a target’s buffer with more input than it is designed to hold.
C. Alice performs an SQL Injection on the homepage of a corporate retailer webpage.
D. Mack infects a target device with a polymorphic virus.

A

《4》

移动代码攻击利用的是在不同系统间执行代码的能力,多态病毒就是这种能力的体现,它通过改变自己的外观来传播而不被发现。这类恶意软件专门设计用于感染、复制和传播,是移动代码网络攻击的明显案例。

100
Q

Due to the volume of transactions being processed on a blockchain, organizations should focus on what type of controls
when applying the COSO internal control framework?
A. Corrective and preventative
B. Preventative and detective
C. Predictive and corrective
D. Detective and corrective

A

《2》

牢记 COSO 框架所建议的对
预防性和侦查性控制
的重视是至关重要的。

101
Q

Activities which outline how an organization should conduct ongoing evaluations of control activities and communicate
internal control deficiencies relate to which of the COSO framework components?
A. Risk assessment
B. Control environment
C. Information and communication
D. Monitoring activities

A

<4>

因为它涉及评估控制活动的有效性和通报不足之处,确保内部控制长期有效。

102
Q

Which of the following economic event and transaction cycle pairings is correct?
A. Loan payments for retail locations are made in the treasury cycle.
B. Investment earnings are recorded in the revenue and cash collections cycles.
C. Store employees are paid in the purchasing and disbursement cycle.
D. Customers place phone orders in the production and fixed asset cycle.

A

《1》
2–>general ledger and reporting cycle
3–> Human resources and payroll cycle
4–>revenue and cash collection cycle

In the context provided and considering common accounting and transaction cycles, there are several distinct cycles each handling different aspects of a business’s economic events and transactions. Here are the main cycles mentioned along with a brief explanation:

  1. Revenue and Cash Collection Cycle:
    • Handles all processes related to selling goods and services and collecting cash from customers. This includes sales order processing, delivery of goods or services, invoicing, and cash receipt.
  2. Human Resources and Payroll Cycle:
    • Manages employee information, calculates wages and salaries, processes payments to employees, and handles related reporting and compliance requirements.
  3. Purchasing and Disbursement Cycle:
    • Involves purchasing goods and services that are necessary for the organization’s operations, processing purchase orders, receiving goods or services, and making payments to suppliers.
  4. Production and Fixed Asset Cycle:
    • Encompasses the processes related to the production of goods, management of inventory, and acquisition and maintenance of fixed assets.
  5. Treasury Cycle:
    • Deals with the management of the company’s capital, including investment decisions, financing activities like loans and equity, and the management of cash resources.
  6. General Ledger and Reporting Cycle (implied in Choice B’s explanation):
    • Involves recording all transactions in the general ledger, preparing trial balances, adjusting entries, and compiling financial statements and reports for internal and external use.

These cycles represent the core activities that occur in most businesses, each with its specific set of transactions and economic events. Understanding these cycles is crucial for effective accounting, financial management, and operational efficiency.

103
Q

may use the Waterfall method as a way to:
A. Realize the benefits of the new system at each stage of completion.
B. Focus on testing and change review.
C. Shorten the time it takes to collect customer input to enhance design features in the new software.
D. Increase productivity so that engineers will be engaged at every point in the process.

A

<2>
选择 “B “是正确的。在更改业务流程和管理系统更改时,企业有多种方法可供选择。
有多种方法可供选择。最常见的两种方法是瀑布法和
敏捷方法。在瀑布式方法下,团队以线性方式工作,而敏捷式方法则将项目结构化,使不同的团队同时工作。
不同的团队同时工作。
瀑布式方法的优势在于,它的各个阶段可以让组织专注于系统设计、测试、部署、变更审查和维护、
部署、变更审查和维护。这将使 Rathway 有机会把开发
这将使 Rathway 有机会将开发过程分成易于管理的小块,以便专注于测试和审查任何必要的变更。

选择 “D “不正确。如果采用瀑布法,一些设计工程师可能会闲置,在某些步骤之前或之后不工作。
在某些步骤之前或之后。因此,由于瀑布法的固有设计,它无法让工程师参与流程的每个步骤。

104
Q

Charlie, a senior service auditor, is reviewing documentation for a major update to an online booking platform. She needs a benchmark to compare the platform’s original setup against the recent changes. What should she use?
A. Proxy logs
B. Baseline configuration
C. Acceptance criteria
D. System component inventory

A

Explanation:
Choice “B” is correct. To assess changes in the platform, Charlie needs a record of the platform’s initial setup, known as the baseline configuration. This serves as a benchmark to measure progress and changes.

Choice “A” is incorrect. Records of website visits, or proxy logs, track user activity, not changes to the system itself.

Choice “C” is incorrect. Project success measures, or acceptance criteria, determine if the project meets user needs, not for comparing system changes.

Choice “D” is incorrect. A list of system parts, or system component inventory, tracks IT assets but doesn’t provide a benchmark for evaluating system changes.

105
Q

which is correct?
1. Account information system is part of an Enterprise resource planning system
2.An AIS is a subsystem with an ERP

A

<1>
AIS may integrate with an ERP, but is is not a subsystem of an ERP

106
Q

Question:
In a SOC 1® Type 2 report, how is the scope section amended regarding complementary user entity controls?

Choices:

A. Includes evaluation of design suitability but not operating effectiveness of these controls.

B. Does not reference the complementary user entity controls.

C. States evaluation includes both design suitability and operating effectiveness of these controls.

D. Indicates no evaluation of design suitability or operating effectiveness of these controls was performed.

A

Correct Answer: D

Explanation:
The correct choice, D, clarifies that the SOC 1® Type 2 report’s scope section will specify that the auditor did not assess the design suitability or operating effectiveness of complementary user entity controls. This approach ensures clarity regarding the auditor’s responsibilities and the limits of the engagement.

107
Q

Which of the following statements is true with respect to system requirements?
A. System requirements are declarations made by service organization management to user entities and others
about the system used to provide the service.
В.
System requirements are the specifications by which the system should function to meet the service
commitments to user entities and others.
C. Service requirements are related to the service organization’s system but are not related to the service
commitments to user entities and others.
D. System requirements determine the service commitments of a service organization.

A

关于系统要求的正确说法是( ):

B. 系统需求是系统为履行对用户实体和其他方面的服务承诺而运作的规格。

这一表述准确地反映了系统需求是详细的规范,旨在确保系统满足组织的服务承诺,包括可靠性、性能、安全性和其他必要的操作标准,以履行组织对客户和合作伙伴的义务。这些要求是设计、实施和维护系统的基础,以支持组织的目标并遵守法律和行业标准。

108
Q

Which of the following would most likely be a user of a SOC 1° report?
A.
The independent auditor of a subservice organization
B. Potential customers of the user entity
C. Potential customers of the service organization
D. The independent auditor of the user entity

A

《4》
以下是选项 D “用户实体的独立审计师 “为正确答案的原因: 用户实体的独立审计师需要对用户实体的财务报表进行审计。
- 用户实体的独立审计师需要了解服务机构提供的服务如何影响用户实体的财务报告内部控制。这些信息对于规划和执行对用户实体财务报表的审计至关重要。

这就是为什么选项 A 不是正确答案的原因:
- 子服务机构(主服务机构将部分任务外包给的实体)的独立审计师更直接关注的是子服务机构本身的控制和流程,而不是 SOC 1 报告中涉及的主服务机构的控制。虽然次级服务机构的控制措施可能会影响服务机构提供服务的能力,但 SOC 1 报告的重点是服务机构的控制措施,因为它们与用户实体的《内部财务报告准则》有关。子服务组织的独立审计师很可能会依赖其他形式的保证,专门针对子服务组织的控制,可能包括他们自己的 SOC 报告,这取决于他们在向主服务组织的客户提供服务时所扮演的角色。

109
Q

Which of the following best describes the overview of CIS Control 05: Account Management?
A. Use processes and tools to assign and manage authorization to credentials for user accounts to enterprise assets and software.
B. Use processes and tools to create, assign, manage, and revoke access credentials and privileges for user, admin, and service accounts for
enterprise assets and software.

A

<a></a>

B–>control 06

110
Q

When merging a new software with existing systems, what risk does an organization face?

Choices:
A. Integration Risk
B. Outsourcing Risk
C. Quality Risk
D. Selection and Acquisition Risk

A

Correct Answer: A

Explanation:
Integration Risk refers to the challenges of incorporating a new system into existing operations, including issues like technical compatibility and user acceptance. It contrasts with risks related to choosing the system (Selection and Acquisition Risk), using third-party services (Outsourcing Risk), and the standard of the components (Quality Risk).

111
Q

The AICPA issued guidance regarding patch management in a SOC 2” audit that states service auditors should:
A. Verify that patches are tested in a production environment prior to release.
B. Inspect policies to ensure they include rules on patch management.
C. Continuously monitor patch releases for a limited period after the audit.
D. Verify that patches are released on a specific day or on a given schedule.

A

《A》

在SOC 2審計中,對於修補管理(patch management),AICPA的指導原則強調制定和執行相關政策和程序的重要性,以及如何評估和應用這些修補程序來保護信息和系統免受已知漏洞的攻擊。

112
Q

Brian would likely take each of the following steps to clean the data except:
A. Format negative numbers to ensure consistency across numerical values.
B. Create a calculated field to further prepare the financial statement data for additional analysis.
C. Remove unnecessary headings or subtotals that would otherwise obstruct synthesis or analysis.
D. Address inconsistent data types, such as date/time, doubles, string, and integer.

A

<b></b>

B–>數據生命週期的例子,不是刪除數據的例子

113
Q

Bring your own device (BYOD) policies will address the following items relevant to personal devices used for work except:
A. Ownership of the data on the device.
B. Restricted activities and application downloads on personal devices.
C. Monitoring and enforcement of actions on personal devices.
D. Physical barriers on personal devices.

A

《4》

不可能物理上控制個人設備,共有設備才可能監管

114
Q

Each of the following are considered benefits associated with relational databases except for which of the following?
A. No redundancy
B. Communication and integration of business processes
C. Business rules enforcement
D. Combining attributes to create unique identifiers

A

Explanation
Choice “D” is correct. Combining attributes to create unique identifiers in a table best describes a composite primary
key, which is a means to create a primary key or rather a design strategy and would not be considered a benefit
associated with relational databases.

The four benefits of relational databases include completeness, no redundancy,
business rules enforcement, and communication and integration of business processes.

115
Q

Which of the following statements is accurate regarding complementary user entity controls?
A. Complementary user entity controls include only those controls at a user entity that are necessary, in combination
with the service organization’s controls, to achieve the control objectives stated in management’s system
description.
B. Service organization management should not make disclosures about the complementary user entity controls in
their system description.
C. Service organization management is responsible for ensuring that complementary user entity controls are
implemented.
D. Complementary user entity controls, considered independently from the service organization’s controls, are
almost always required to achieve the service commitments and system requirements of the service organization.

A

关于补充用户实体控制(CUEC),正确的说法是( ):

A. 补充性用户实体控制措施只包括用户实体的控制措施,这些控制措施与服务组织的控制措施相结合,是实现管理层系统描述中所述控制目标所必需的。

解释:

  • 选项 A**正确,因为补充性用户实体控制措施确实是那些与服务组织的控制措施相结合,有助于实现服务组织系统说明中所述控制目标的控制措施。用户实体有必要实施这些控制措施,以确保控制环境的整体有效性。
  • 选项 B**不正确。服务机构管理层通常会在系统描述中披露用户实体的补充控制措施,以告知用户实体他们应与服务机构的控制措施一起实施的控制措施。这种披露对于用户实体了解其在整体控制环境中的作用至关重要。
  • 选项 C**不正确,因为实施补充用户实体控制措施的责任在于用户实体的管理 层,而不是服务组织。虽然服务组织可以就这些控制措施的内容提供指导,但用户实体有责任确保这些控制措施得到有效实施。
  • 选项 D** 的表述具有误导性。补充用户实体控制措施需要与服务组织控制措施相结合,以满足服务承诺和系统要求。然而,”几乎总是需要 “的说法完全歪曲了这些控制措施的性质。它们是更广泛控制环境的一部分,专门设计用于与服务组织的控制措施协同工作,而不是独立工作。
116
Q

Peggy is helping Kidell Corporation decide on setting up a relational database for decision-making. What is a key benefit of relational databases she might highlight?

Options:

A. They summarize database information for easier data work and understanding.

B. They increase redundant data storage to minimize data-entry mistakes.

C. They ensure all necessary data for a business process is included in the dataset.

D. They structure data into rows and columns for specific types of records.

A

Correct Answer: C. Relational databases are designed for completeness through normalization, ensuring that all essential data for a business process is captured in the dataset, which is a significant benefit for decision-making purposes.

A–总结数据库信息。是一个更广泛的特性,而不是关系数据库所特有的。
B–增加冗余数据存储。关系数据库通常避免的一种方法,因为不必要的冗余会导致不一致和存储需求增加。
C–确保业务流程的所有必要数据。本选项是最准确的,因为关系数据库通过其设计和结构支持确保业务流程所需数据完整性的目标。规范化过程有助于以这样一种方式组织数据,即所有相关数据都存储在一起,没有不必要的重复,从而支持决策所需的全面、高效的数据检索。
D–将数据结构化为行和列。没有特别强调有助于决策的好处

117
Q

Gregory, a CPA, is starting the process of normalizing a tax client’s database. What is the first step he should take to ensure data normalization?

Options:

A. Check if each field contains only one piece of information and each record has a unique primary key.

B. Make all non-key attributes depend on another non-key attribute.

C. Ensure each column only describes the primary key and no non-key attributes depend on other non-key attributes.

D. Make all non-key attributes depend on the entire primary key.

A

Explanation:

Correct Answer: A. The initial step in data normalization involves ensuring the database conforms to the first normal form (1NF), which requires each field to contain only a single piece of information and each record to be uniquely identifiable, typically through a primary key.

b/C–>3NF
D–>2NF

118
Q

The Control Environment is the foundation of the Committee of Sponsoring Organizations of the Treadway Commission’s (COSO) Internal Control — Integrated Framework. It sets the tone of an organization, influencing the control consciousness of its people. It’s the basis for all other components of internal control, providing discipline and structure. The Control Environment consists of five principles:

Principal 1: The organization demonstrates a commitment to integrity and ethical values.
Keywords for Situations: Ethical standards, Code of Conduct, Integrity, Ethical behavior, Leadership’s commitment to ethics, Ethical decision-making.
Principal 2: The board of directors demonstrates independence from management and exercises oversight of the development and performance of internal control.
Keywords for Situations: Board independence, Governance, Oversight, Director engagement, Board’s role in internal control, Monitoring by the board.
Principal 3: Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives.
Keywords for Situations: Organizational structure, Delegation of authority, Reporting lines, Roles and responsibilities, Management’s responsibility for internal control.
Principal 4: The organization demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives.
Keywords for Situations: Competence, Training and development, Recruitment, Retention strategies, Alignment with objectives, Skills and knowledge.
Principal 5: The organization holds individuals accountable for their internal control responsibilities in the pursuit of objectives.
Keywords for Situations: Accountability, Performance measures, Evaluations, Consequences for non-compliance, Rewards and incentives, Responsibilities and duties.
When choosing a principal based on a given situation, identify the keywords or phrases that match the situation’s description to one of these principles. This approach helps in assessing and enhancing the organization’s control environment as part of an overall risk management and internal control strategy.

A

控制环境是特雷德韦委员会赞助组织委员会(COSO)内部控制综合框架的基础。它为组织定下基调,影响员工的控制意识。它是内部控制所有其他组成部分的基础,提供纪律和结构。控制环境包括五项原则:

原则 1:组织展示对诚信和道德价值观的承诺。
情况关键词: 道德标准、行为准则、诚信、道德行为、领导层对道德的承诺、道德决策。
原则 2:董事会独立于管理层,对内部控制的制定和实施进行监督。
情况关键词: 董事会独立性、治理、监督、董事参与、董事会在内部控制中的作用、董事会监督。
原则 3:管理层在董事会的监督下,为实现目标而建立结构、报告关系和适当的权责。
情况关键词: 组织结构、授权、报告关系、角色与责任、管理层的内部控制责任。
要素 4:组织致力于吸引、培养和留住有能力的个人,使其与目标保持一致。
情况关键词: 能力、培训与发展、招聘、留用战略、与目标保持一致、技能与知识。
要素 5:组织要求个人在实现目标的过程中对其内部控制责任负责。
情况关键词: 责任、绩效衡量、评价、违规后果、奖励和激励、责任和义务。
在根据特定情况选择主要原则时,找出与情况描述相匹配的关键字或短语。这种方法有助于评估和加强组织的控制环境,作为整体风险管理和内部控制战略的一部分。