Correct Answers
A - CORRECT ANSWER✔✔Which of the following appropriately describes a service auditor's
responsibilities regarding a service organization's description of the system, the suitability of the
design of controls, the operating effectiveness of controls, or management's assertion after the
date of the service auditor's report?
A.
The service auditor is not required to perform any procedures after the date of the service
auditor's report but must respond appropriately to any subsequently discovered facts.
B.
The service auditor is required to inquire of management and perform procedures to obtain
evidence after the date of the service auditor's report.
C.
The service auditor is not required to perform any procedures after the date of the service
auditor's report and has no responsibility to follow up on any subsequently discovered facts.
D.
The service auditor is required to inquire of management about subsequent events occurring
after the date of the auditor's report.
Which of the following is a common document found in the human resources and payroll cycle?
A.
Voucher
B.
Production schedule
C.
Earnings statement
,D.
Receipt - CORRECT ANSWER✔✔C
General controls in an information system include each of the following, except:
A.
Logic tests.
B.
Software acquisition.
C.
Security management.
D.
Information technology infrastructure. - CORRECT ANSWER✔✔A
What is the primary disadvantage of using a cold site as a disaster recovery site?
A.
Existing equipment or software at the site may not be compatible.
B.
Delivery of equipment and software may be delayed.
C.
Cold site compilers may not have adequate processing capacity.
D.
Frequent upgrades to equipment and software increase costs. - CORRECT ANSWER✔✔B
In all SOC engagements, risk assessment primarily focuses on:
A.
IT risk.
,B.
Inherent risk.
C.
Detection risk.
D.
Control risk. - CORRECT ANSWER✔✔B
Which of the following framework functions in the Privacy Framework Core best describes how
the organization answers what the company's privacy risks related to data processing activities
are?
A.
Control
B.
Communicate
C.
Govern
D.
Identify - CORRECT ANSWER✔✔D
Which of the following assumes that a company's network is always at risk and focuses on
continuous validation?
A.
Least privilege
B.
Whitelisting
C.
Need-to-know
, D.
Zero trust - CORRECT ANSWER✔✔D
Which database schema, commonly used for dimensional modeling, is best described as one
where data is organized into a central fact table with associated dimension tables surrounding
it?
A.
Flat model
B.
Hierarchical model
C.
Snowflake schema
D.
Star schema - CORRECT ANSWER✔✔D
All of the following are considered requirements by the Payment Card Industry Data Security
Standard (PCI DSS) except which of the following?
A.
Enhancing accessibility of stored cardholder data by utilizing shared storage drives between
banks, retailers, and customers
B.
Restricting access to cardholder data through the utilization of need-to-know restrictions
C.
Enhancing the protection all organization systems to combat malware and regularly update
antivirus software or programs
D.
Updating all passwords and parameters to ensure that vendor-supplied defaults for system
passwords and other security parameters are not in use - CORRECT ANSWER✔✔A