SOC 2 reports are created for internal and other authorized stakeholders and are
ID: 3882865 • Letter: S
Question
SOC 2 reports are created for internal and other authorized stakeholders and are commonly implemented for service providers, hosted data centers, and managed cloud computing providers.
True
False
In security testing data collection, observation is the input used to differentiate between paper procedures and the way the job is really done.
True
False
Committee of Sponsoring Organizations (COSO) is a set of best practices for IT management.
True
False
A report indicating that a system's disk is 80 percent full is a good indication that something is wrong with that system.
True
False
Regarding log monitoring, false negatives are alerts that seem malicious but are not real security events.
True
False
Data loss prevention (DLP) uses business rules to classify sensitive information to prevent unauthorized end users from sharing it.
True
False
Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets in a traffic stream rather than justin individual packets.
True
False
Which regulatory standard would NOT require audits of companies in the United States?
Sarbanes-Oxley Act (SOX)
Personal Information Protection and Electronic Documents Act (PIPEDA)
Health Insurance Portability and Accountability Act (HIPAA)
Payment Card Industry Data Security Standard (PCI DSS)
In security testing, reconnaissance involves reviewing a system to learn as much as possible about the organization, its systems, and its networks.
True
False
Sarbanes-Oxley Act (SOX)
Personal Information Protection and Electronic Documents Act (PIPEDA)
Health Insurance Portability and Accountability Act (HIPAA)
Payment Card Industry Data Security Standard (PCI DSS)
In security testing, reconnaissance involves reviewing a system to learn as much as possible about the organization, its systems, and its networks.
True
False
Explanation / Answer
1. True
2. True
3. False : COSO is an organization to fight against corporate frauds.
4. Flase : 80 percent full disk activity indicates that disk activity is high. It does not represent anything wrong with the system.
5. False: In Log monitoring, flase negative alarms defines the situation when alarms does not ring on real attacks,
6. False: DLP is uses rules to classify business information to prevent authorised user from sharing it outside the company.
7. True
8. Personal Information Protection and Electronic Documents Act (PIPEDA)
9. True
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.