Wednesday, December 18, 2019

Cisa - 12611 Words

1. A benefit of open system architecture is that it: A. facilitates interoperability. B. facilitates the integration of proprietary components. C. will be a basis for volume discounts from equipment vendors. D. allows for the achievement of more economies of scale for equipment. ANSWER: A NOTE: Open systems are those for which suppliers provide components whose interfaces are defined by public standards, thus facilitating interoperability between systems made by different vendors. In contrast, closed system components are built to proprietary standards so that other suppliers systems cannot or will not interface with existing systems. 2. An IS auditor discovers that developers have operator access to the command line of a†¦show more content†¦6. When reviewing an implementation of a VoIP system over a corporate WAN, an IS auditor should expect to find: A. an integrated services digital network (ISDN) data link. B. traffic engineering. C. wired equivalent privacy (WEP) encryption of data. D. analog phone terminals. ANSWER: B NOTE: To ensure that quality of service requirements are achieved, the Voice-over IP (VoIP) service over the wide area network (WAN) should be protected from packet losses, latency or jitter. To reach this objective, the network performance can be managed using statistical techniques such as traffic engineering. The standard bandwidth of an integrated services digital network (ISDN) data link would not provide the quality of services required for corporate VoIP services. WEP is an encryption scheme related to wireless networking. The VoIP phones are usually connected to a corporate local area network (LAN) and are not analog. 7. An IS auditor selects a server for a penetration test that will be carried out by a technical specialist. Which of the following is MOST important? A. The tools used to conduct the test B. Certifications held by the IS auditor C. Permission from the data owner of the server D. An intrusion detection system (IDS) is enabled ANSWER: C NOTE: The data owner should be informed of the risks associated with a penetration test, what types of tests are to be conducted and other relevant details. All other choices are not as importantShow MoreRelatedCyber Security : New Law1719 Words   |  7 PagesManagement, the Senate decided to take action. On October 27, Senate passed the CISA or Cybersecurity Information Sharing Act. This act is â€Å"designed to [stop] corporate data breaches by allowing companies to share cybersecurity threat date with Department of Homeland Security [and then] pass it on other agencies. . . who in theory use it to defend the target company and others facing similar attacks† (Greenberg). CISA addresses the issue of attempting to stop hacks on major companies by giving theRead MoreHow Technology Has Changed Business Environment1539 Words   |  7 Pagesmay begin to be. The current information technology certifications are Certified Information Security Manager (CISM), Certified Informatio n Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), Certified in the Governance of Enterprise IT (CGEIT), and the Certified Information Technology Professional (CITP). The CISA is currently the oldest IT certification as being established in 1978 compared to 2002 for CISM, 2003 for CITP, 2007 for the CGEIT, and 2010 for the CRISCRead MoreFinancial Management And Efficient Planning1373 Words   |  6 Pagescritical indicators of financial strengths and weaknesses and thus the basis of the overall situation analysis. Some of the significant financial ratios include; profitability ratios, leverage ratios, activity ratios, and liquidity ratios (Tugas CISA, 2012). These ratios can identify financial trends for the company and can be used to make industry comparisons. Ratios calculated from Snead’s Dry-Cleaning Company, therefore, will be a basis for comparison to improve the financial position and suggestRead MoreCollaboration Between Users And U sing Crowdsourcing Platforms991 Words   |  4 Pagesoriginally intended, or made available to unauthorized parties (Cilliers Flowerday, 2015). The best example to illustrate the problem with trust in information use and intent with crowdsourcing is the US bill CISA, The Cybersecurity Information Sharing Act of 2015. Essentially, CISA requires government agencies, corporations and other organizations to share cybersecurity threat information with one another to help identify potential threats (Tracy, 2015). The problem with the bill is not theRead MoreThe Government Intervention And Its Effect On National Security1203 Words   |  5 Pagesmeasure of government intervention is the passing of the Cybersecurity Information Sharing Act (CISA) of 2015. The current goal of CISA would allow for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The aim of the bill is to help the U.S. government investigate cyber threats and ensure the security of networks against cyberattacks (CISA, 2015). While it is true that the government is slow to move there are also times when the privateRead MoreSample Resume : National Open University Of Nigeria852 Words   |  4 Pagesadmitted. The admission process takes approximately 72 hours. Noun University is available throughout the country, Nigeria with over 32,000 students Open University of Nigeria has programs for undergraduate, Diploma, well recognized Certifications like CISA, CIA etc., Postgraduate, Masters and Ph.D. Programs. National Open University will never go on strike. The duration of the course is 4 years. 2. IJMB in Unilorin, University of Abuja and ABU Zaria: The program offered in these schools is called INTERIMRead MoreAdvantages And Disadvantages Of Security Outsourcing746 Words   |  3 PagesWaterfall method of software development mainly because of its speed of development. It is very appropriate when software has to be developed in crash time (tight deadline) and its customer focused. References: Certified Information System Auditor (CISA) Review Manual http://www.nytimes.com/allbusiness/AB5221523_primary.html https://www.cmcrossroads.com/article/change-management-not-change-control http://www.brighthubpm.com/change-maRead MoreThe Role of Information Security Policy Essay894 Words   |  4 Pagesfocuses on building security into the Software Development Life Cycle. Certified Information Security Manager (CISM) certification is perfect for management level professional working in an enterprise environment. Certified Information Systems Auditor (CISA) certification trains professionals in IS audit control and assurance. This list could go on, but the take-away is that many businesses can benefit from employing security professionals with the skills and knowledge gained through these certificationsRead MoreCobit Casestudy Tibo8168 Words   |  33 PagesISACA sponsors international conferences, publishes the Information Systems Control Journal ®, develops international information systems auditing and control standards, and administers the globally respected Certified Information Systems Auditorâ„ ¢ (CISA ®) designation, earned by more than 35,000 professionals since inception, and the Certified Information Security Manager ® (CISM ®) designation, a groundbreaking credential earned by 5,000 professionals in its first two years. Disclaimer The IT Governance

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.