Answers
Which of the following is not considered an intended audience for NIST SP 800-53? - CORRECT
ANSWER✔✔Individuals in marketing/advertising
NIST Framework Core - CORRECT ANSWER✔✔Identify, protect, detect, respond, recover
NIST CSF Focus - CORRECT ANSWER✔✔develop a program to identify, assess, and manage
cybersecurity in a cost-effective and repeatable manner
Implementation Tier 1 - CORRECT ANSWER✔✔Partial, corporate cybersecurity is isolated and
the organization does not evaluate external risks
Implementation Tier 2 - CORRECT ANSWER✔✔risk-informed, awareness but no integration
Implementation Tier 3 - CORRECT ANSWER✔✔repeatable, organizational risk approach to
cybersecurity where cybersecurity is integrated into planning and regularly communicated
among senior leadership
Implementation Tier 4 - CORRECT ANSWER✔✔Adoptive, organization-wide affair where cyber
risk is prioritized similarly to other forms or organizational riskl
Which of the following descriptions best summarizes the holistic approach governance system
principle under COBIT 2019? - CORRECT ANSWER✔✔Governance systems for IT can comprise
diverse components.
,In an effort to recognize improvement opportunities, a company is reviewing its in-house
systems. The best reason for the company to consider switching to cloud computing as a
solution is that it: - CORRECT ANSWER✔✔Usually has lower upfront costs for equipment and
maintenance.
Service organizations have contracts with their clients with terms outlining standards for system
availability, such as an agreed service time (AST), a minimal amount of downtime (DT), and the
mean time to repair (MTTR) a damaged device. This is referred to as a - CORRECT
ANSWER✔✔Service level agreement
Which database schema, commonly used for dimensional modeling, is best described as one
where data is organized into a central fact table with associated dimension tables surrounding
it? - CORRECT ANSWER✔✔Star schema
Which of the following terms best describes a payroll system? - CORRECT
ANSWER✔✔Transaction processing system (TPS)
Each of the following describe how the NIST Privacy Framework helps organizations manage
privacy except for which of the following? - CORRECT ANSWER✔✔Reducing personal
information gathered to the minimum necessary for critical business functions
Software engineers have tested and debugged code for a new product prototype and are about
to perform the final phases of evaluation prior to deployment. This next round of validation
would most likely happen in which of the following types of environments? - CORRECT
ANSWER✔✔Staging
In which cyberattack stage do the attackers discover and collect as much information about the
target IT system as possible? - CORRECT ANSWER✔✔Reconnaissance
During the payment clearing process, which of the following methods of data obfuscation would
most likely be used in relation to credit card transactions? - CORRECT ANSWER✔✔Tokenization
, Under what circumstances would a service auditor be required to be independent from a
subservice organization used by a service organization in an engagement to report on controls
at a service organization? - CORRECT ANSWER✔✔Independence is required when a subservice
organization is used and management elects to use the inclusive method to present its system
description.
In all SOC engagements, risk assessment primarily focuses on: - CORRECT ANSWER✔✔inherent
risk
SQL Injection is an example of what type of attack: - CORRECT ANSWER✔✔application based
Data flow diagrams visually - CORRECT ANSWER✔✔the logical flow
Flowcharts visualize - CORRECT ANSWER✔✔both the logical and physical flow of data
A bridge is a - CORRECT ANSWER✔✔network component, not a security method, that connects
separate networks that use the same protocol, even if those networks have different topologies
or transmission speeds. Bridges operate at the data link layer of a network.
When an adverse opinion is issued - CORRECT ANSWER✔✔a separate paragraph should be
added in the opinion section, before the opinion paragraph, to provide a description of the
matter(s) giving rise to modification.
A cloud service provider's vision is to provide reliable and consistent network connectivity for all
customers. Part of its corporate strategy for achieving that is heavily reliant on all of the
following except: - CORRECT ANSWER✔✔Utilizing a community cloud deployment model.
Testing of recovery plan pertains to which of the trust services criteria - CORRECT
ANSWER✔✔Availability