Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

SECTION II TRUE or FALSE (1) _____________ Audit Execution is independent upon t

ID: 3720178 • Letter: S

Question

SECTION II TRUE or FALSE  

(1) _____________ Audit Execution is independent upon the scope of the audit.

(2) ____________ It is important that he individuals that are selected for interview are
                                            able to answer the questions posed by the auditors.

(3) ____________ It is advisable to send the audit artifacts by email.

(4) ____________ Corrective actions plan (CAP) are typically due within 20 days after
                                  final report issuance.

(5) ____________ One of the most important aspects in designing a security awareness
                                program is to select a theme for the training.

(6) ___________ The Management group and those directly involved in an        
                               information security function, should be the primary focus during
                              security awareness training.

(7)___________ Phishing emails direct you to the fake website to enter account information.”

(8)____________ Maintaining training records of employees is the only way this can
                               be managed in any significant enterprise.

(9)___________ Each policy should be specific and action oriented, including
                             Baselines to take around each topic.

(10)__________ Policies published online should be limited in length to two to three pages.   
                              

(11)__________COBIT is a nationally accepted set of tools organized into a framework
                               
that executives can use to ensure their IT is helping them achieve
                          their goals and objectives.

(12)_________ Sensitive information is confidential material would cause
                          damage or be prejudicial to national security if publicly available.

[13] _________ Effective policies have consistent sanction policies to enable action
                              when the policies are n
ot followed.

[14]__________COBIT can be used to integrate other standards as an umbrella framework.

[15]_________COBIT is published by IT Governance Institute and contains a
                             set of 34 high-level control objectives.

[16]_________ Privacy is defined as the power to allow what others know about you         
                          and what they can do with this information.

[17] ­­­­­­­­­­­­­­­­­________The last activity in Information Life Cycle is Retirement.

[18] ________ Business secrets are protected through trade secret laws.

[19]_________ a firewall provides a "logical" key to obtain access to the door.

[20[_________ According to NIST 800-53 Awareness and Training is among Operational Controls.

Explanation / Answer

(1)True Audit Execution is independent upon the scope of the audit.

(2)True  It is important that he individuals that are selected for interview are
                                            able to answer the questions posed by the auditors.

(3) True  It is advisable to send the audit artifacts by email.

(4) True  Corrective actions plan (CAP) are typically due within 20 days after
                                  final report issuance.

(5) True  One of the most important aspects in designing a security awareness
                                program is to select a theme for the training.