Answers 2025
Devices that have a primary function of enabling other machines in a network to share an IP
address so that identities may be hidden are referred to as:
A.
Network address translation firewalls.
B.
Application-level gateways.
C.
Software-defined wide-area network (SD-WAN) devices.
D.
Circuit-level gateways. - CORRECT ANSWER✔✔A.
Network address translation firewalls.
In all SOC engagements, risk assessment primarily focuses on:
A.
Detection risk.
B.
IT risk.
C.
Sampling risk.
D.
Inherent risk. - CORRECT ANSWER✔✔D.
Inherent risk.
,Under what circumstances would a service auditor be required to be independent from a
subservice organization used by a service organization in an engagement to report on controls
at a service organization?
A.
Independence is required when a subservice organization is used and management elects to
use the inclusive method to present its system description.
B.
Independence is required when a subservice organization is used and management elects to
use the carve-out method to present its system description.
C.
Independence is never required between the service auditor and a subservice organization.
D.
Independence is always required between the service auditor and a subservice organization. -
CORRECT ANSWER✔✔A.
Independence is required when a subservice organization is used and management elects to
use the inclusive method to present its system description.
Dave manages end-point security solutions for a health care consortium. Dave is implementing
a solution in which software quarantines malware detected on user devices. What is the
purpose of quarantining in this context?
A.
Removing a virus's threat from the rest of a company's network, usually accomplished in an
automa
b
Scanning files in real-time and comparing them to a library of known viruses. Scheduled scans of
systems should occur automatically and be performed on a regular basis.
C.
, Monitoring and filtering traffic based on a set of predefined rules so that only trusted parties
and networks can connect or interact with an organization's network, which prevents threat
actors from compromising the network.
D.
Modifying the existing software program to resolve newly discovered design flaws, operating
errors, or gaps that pose cybersecurity risks. - CORRECT ANSWER✔✔A
When complementary user entity controls are identified, the scope section of the service
auditor's SOC 1® Type 2 report will be amended to include which of the following?
A.
A statement that the service auditor did not evaluate the suitability of the design or operating
effectiveness of the complementary user entity controls.
B.
A statement that the engagement includes the evaluation of suitability of the design and
operating effectiveness of the complementary user entity controls.
C.
A statement that the engagement includes the evaluation of the suitability of the design but not
the operating effectiveness of the complementary user entity controls.
D.
The scope section should not be amended to reference the complementary user entity controls.
- CORRECT ANSWER✔✔A
What is the primary disadvantage of using a cold site as a disaster recovery site?
A.
Cold site compilers may not have adequate processing capacity.
B.
Existing equipment or software at the site may not be compatible.
C.
Delivery of equipment and software may be delayed.