IT Governance and Compliance Exam Materials - 349 Verified Questions

Page 1


IT Governance and Compliance

Exam Materials

Course Introduction

IT Governance and Compliance explores the frameworks, policies, and strategies organizations use to ensure their information technology aligns with business objectives, manages risks, and complies with relevant laws and regulations. The course delves into global standards such as COBIT, ISO/IEC 38500, and ITIL, examining how effective IT governance enhances accountability, transparency, and performance. Students learn to identify regulatory requirements, design compliance programs, and balance organizational agility with security and ethical considerations. Practical case studies and real-world scenarios provide insights into implementing governance structures, audit processes, and compliance controls within diverse industries.

Recommended Textbook

Information Security and IT Risk Management 1st Edition by Manish Agrawal

Available Study Resources on Quizplus

14 Chapters

349 Verified Questions

349 Flashcards

Source URL: https://quizplus.com/study-set/3541

2

Chapter 1: Introduction

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70324

Sample Questions

Q1) The war between Russia and Georgia in 2008 is important to information security for A) Its impact on global warming

B) The use of nuclear weapons

C) Making people aware of the possibility of state-sponsored cyber-attacks

D) The heavy loss of life

Answer: C

Q2) Information security is becoming increasingly important because of

A) The increasing criticality of information to individuals and organizations

B) There is a general increase in criminal behavior in society

C) People are greedier these days

D) Organizations are wealthier these days

Answer: A

Q3) The Internet is relevant for information security because

A) It exposed computers to attacks from around the world

B) It caused one of the most significant Internet outages ever

C) It led to exploits from weakness is wireless networks

D) It caused falsification of financial records at publicly traded companies

Answer: A

To view all questions and flashcards with answers, click on the resource link above.

3

Chapter 2: System Administration

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70325

Sample Questions

Q1) Selecting one among many possible combinations of features of a system is called

A) User management

B) Access control

C) Installation

D) Configuration

Answer: D

Q2) A Linux distribution is

A) A collection of open source utilities and software packaged with the Linux OS

B) An older version of Linux

C) A specific version of Linux, focused on competing with Microsoft

D) The "official" version of Linux

Answer: A

Q3) The system security officer is the person responsible for

A) Day-to-day operation of a technology system

B) Writing , enforcing , and reviewing security-operating procedures

C) Developing new technology systems

D) Upgrading existing technology systems

Answer: B

To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: System Administration 2

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70326

Sample Questions

Q1) The current folder is represented in Linux by A) /

B) .

C) ..

D) $

Answer: B

Q2) The command used to copy files in Unix/ Linus is

A) cp

B) copy

C) pwd

D) rm

Answer: A

Q3) An example of a relative path is

A) /temp.txt

B) /usr/temp.txt

C) ~/temp.txt

D) /home/joe/temp.txt

Answer: C

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Basic Information Security Model

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70327

Sample Questions

Q1) Malware refers to

A) Programs that propagate through the network without a user's consent

B) Unauthorized prevention of access to resources

C) Attempting to compromise a user by masquerading as a trustworthy entity in electronic communication

D) Code specifically designed to exploit a computer or data, without the user's consent

Q2) Zeus and Spyeye are examples of

A) Viruses

B) Vulnerabilities

C) IDEs to create new attacks

D) Systems to defend against attacks

Q3) Physical controls

A) Use non-technical methods of preventing harm

B) Are the security measures built into the information system itself

C) Perform malicious tasks at the direction of a remote controller

D) Manipulate people into performing desired actions

Q4) Vulnerabilities in IT systems can be eliminated through secure coding practices

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Asset Identification and Characterization

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70328

Sample Questions

Q1) In most organizations, the most important assets from the perspective of information security are

A) Hardware assets

B) Information assets

C) Software assets

D) Personnel assets

Q2) The parameters used to characterize assets are

A) Asset sensitivity and asset criticality

B) Asset confidentiality and asset restrictions

C) Restricted and unrestricted assets

D) Essential, required and deferrable assets

Q3) Checklist based approaches can be used to identify

A) Asset priorities

B) Idiosyncratic assets

C) General assets

D) Assets

To view all questions and flashcards with answers, click on the resource link above.

Page 7

Chapter 6: Threats and Vulnerabilities

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70329

Sample Questions

Q1) Threat models are

A) Capabilities, intentions and attack methods of adversaries

B) Interactions between relevant agents, actions

C) Individuals, organizations or groups that originate a particular threat action

D) Activist groups

Q2) Unapproved software can be a threat action because

A) The software may be exploited by hackers

B) Organizations do not like employees or users to pay for software

C) The software may take up hard disk space

D) The software may have been developed by a competitor

Q3) In the context of internal security, partners are

A) People external to the organization

B) People directly associated with the organization, often as employees

C) Third parties sharing a business relationship with the organization

D) All of the above

To view all questions and flashcards with answers, click on the resource link above.

8

Chapter 7: Encryption Controls

Available Study Resources on Quizplus for this Chatper

24 Verified Questions

24 Flashcards

Source URL: https://quizplus.com/quiz/70330

Sample Questions

Q1) Public key encryption techniques used in practice are based heavily on A) Division operations

B) Set operations

C) Extraction operations

D) Modulus operations

Q2) The most common technologies used for secure network communication are

A) VPN and SSL

B) AES and DES

C) PKI and RSA

D) Diffusion and confusion

Q3) The word Cipher is based on an Arabic word, cifr, that means

A) Sender

B) Secret

C) Nothing

D) Receiver

Q4) Block encryption uses both

A) Relational and Procedural operations

B) Substitution and permutation

C) Keys and hashes

D) Data and storage

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Identity and Access Management

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70331

Sample Questions

Q1) Identity enrichment involves

A) Locating all new and updated identities in the organization

B) Comparing each discovered identity to a master record of all individuals in the organization

C) Collecting data about each individual's relationship to the organization

D) Making decisions about granting users access to resources

Q2) Kerberos has been very useful in securing corporate desktop infrastructures

A)True

B)False

Q3) Authentication is

A) The process of proving that a user is the owner of the identity being used

B) A secret series of characters known only to the user

C) The use of minute differences in physical traits to prove identity

D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens

Q4) An individual's affiliation with the organization is called their

A) Access

B) Role

C) Account

D) Password

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Hardware and Software Controls

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70332

Sample Questions

Q1) Password guessing is

A) Passwords on the system known to unauthorized users

B) Acquiring passwords from storage, network transmission or user knowledge

C) Repeated attempts to authenticate using possible passwords

D) Generating character strings to match existing passwords

Q2) The merits of firewalls include all the following except

A) Costs

B) Complexity

C) Wide availability

D) Vulnerability to poor configuration

Q3) A firewall is

A) A list of permissions attached to specified objects

B) The process of defining, implementing, and maintaining password policies throughout an enterprise

C) A form of protection that allows one network to connect to another network while maintaining some amount of protection

D) Passwords on the system known to unauthorized users

Q4) PINs are useful in high security systems

A)True

B)False

11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Shell Scripting

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70333

Sample Questions

Q1) Shell scripts are used for

A) Serving as firewalls

B) Automating processes in operating systems

C) End-point protection

D) Detecting intrusions

Q2) Consider the following script. The output will be newlines replaced by spaces for brevity): #! /bin/bash for number in \(\{ 5 \ldots 1 \}\) do echo snumber done

A) 5 .. 1

B) 5 4 3 2 1

C) 1 2 3 4 5

D) 5 3 1

Q3) Environment variables are

A) Variables describing the user's access to the computer environment

B) Variables describing the local climate

C) Variables describing the state of the host system

D) Variables created automatically when a user starts a new terminal window

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Incident Handling

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70334

Sample Questions

Q1) According to the need-to-know principle of information management, information provided

A) Is limited to what is necessary to perform the job

B) Satisfies the information seeker's curiosity need-to-know

C) Is guided by state-mandated legal guidelines

D) Information is kept secret by default

Q2) The stages of incident handling include

A) Planning, detection, maintenance, retirement

B) Preparation, detection, containment, post-incident analysis

C) Planning, acquisition, deployment, post-incident analysis

D) Preparation, acquisition, deployment, post-incident analysis

Q3) The leader of the IRT is preferably

A) Someone from the senior leadership of the organization

B) A technically competent professional with high credibility within the organization

C) The functional leader of the business unit affected by the incident

D) The leader of the IT function within the organization

To view all questions and flashcards with answers, click on the resource link above.

13

Chapter 12: Incident Analysis

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70335

Sample Questions

Q1) Security administrators use logs to

A) Analyze security incidents

B) Ensure that the application is behaving as expected

C) Monitor disk space requirements of applications

D) Ensure optimum performance of the application

Q2) File timestamps are known as MAC timestamps, where MAC stands for

A) Medium access control

B) Modification, access, creation

C) Multiple account creation

D) Media, agent and creativity

Q3) Event criticality in Windows logs is indicated by labels including A) Urgent, notice

B) Notice, warning

C) Critical, urgent

D) Information, warning

Q4) Syslog facilities include all of the following except

A) auth

B) cron

C) kern

D) debug

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Policies, Standards and Guidelines

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70336

Sample Questions

Q1) The need for the policy is specified in the A) Scope

B) Statement

C) Overview

D) Enforcement

Q2) Security policies serve all the following functions except

A) Conveying organizational priorities

B) Obtaining managerial backing

C) Evading responsibility

D) Ensuring organizational consistency

Q3) From the perspective of information security, the Sarbanes-Oxley SOX act defines A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information

B) Protections for the privacy of student education records

C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data

D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information

To view all questions and flashcards with answers, click on the resource link above.

15

Chapter 14: It Risk Analysis and Risk Management

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70337

Sample Questions

Q1) The management model that guides the ISO risk management methodology is

A) Toyota's Muda, Kaizen, Jidoka, Muri

B) Juran's planning, control, improvement

C) Shewart's mean, range, standard error

D) Deming's Plan-Do-Check-Act

Q2) A certain risk has a 1% likelihood of occurrence in the coming year. If the risk is observed, the organization estimates a loss of $1million. A second risk has a 15% likelihood of occurrence in the coming year. If the second risk is observed, the organization estimates a loss of $100,000. Comparing the two risks

A) Risk 2 is greater than risk 1

B) Risk 1 is greater than risk 2

C) Risk 2 is equal to risk 1

D) Risk 2 is negligible

Q3) Risk is

A) A quantified measure of the potential damage caused by a specified threat

B) Capabilities, intentions and attack methods of adversaries to cause harm to assets

C) Resource or information that is to be protected

D) Weaknesses in an information system that can lead to a compromise of an asset

To view all questions and flashcards with answers, click on the resource link above. Page 16

Turn static files into dynamic content formats.

Create a flipbook