Question: SECTION II TRUE or FALSE (1) _____________ Audit Execution is independent upon the scope of the audit. (2) ____________ It is important that he individuals

SECTION II TRUE or FALSE

(1) _____________ Audit Execution is independent upon the scope of the audit.

(2) ____________ It is important that he individuals that are selected for interview are able to answer the questions posed by the auditors. (3) ____________ It is advisable to send the audit artifacts by email.

(4) ____________ Corrective actions plan (CAP) are typically due within 20 days after final report issuance.

(5) ____________ One of the most important aspects in designing a security awareness program is to select a theme for the training.

(6) ___________ The Management group and those directly involved in an information security function, should be the primary focus during security awareness training.

(7)___________ Phishing emails direct you to the fake website to enter account information.

(8)____________ Maintaining training records of employees is the only way this can be managed in any significant enterprise.

(9)___________ Each policy should be specific and action oriented, including Baselines to take around each topic.

(10)__________ Policies published online should be limited in length to two to three pages.

(11)__________COBIT is a nationally accepted set of tools organized into a framework that executives can use to ensure their IT is helping them achieve their goals and objectives.

(12)_________ Sensitive information is confidential material would cause damage or be prejudicial to national security if publicly available.

[13] _________ Effective policies have consistent sanction policies to enable action when the policies are not followed.

[14]__________COBIT can be used to integrate other standards as an umbrella framework.

[15]_________COBIT is published by IT Governance Institute and contains a set of 34 high-level control objectives.

[16]_________ Privacy is defined as the power to allow what others know about you and what they can do with this information.

[17] ________The last activity in Information Life Cycle is Retirement. [18] ________ Business secrets are protected through trade secret laws. [19]_________ a firewall provides a "logical" key to obtain access to the door.

[20[_________ According to NIST 800-53 Awareness and Training is among Operational Controls.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!