Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

SOC 2 reports are created for internal and other authorized stakeholders and are

ID: 3882865 • Letter: S

Question

SOC 2 reports are created for internal and other authorized stakeholders and are commonly implemented for service providers, hosted data centers, and managed cloud computing providers.

True

False

In security testing data collection, observation is the input used to differentiate between paper procedures and the way the job is really done.

True

False

Committee of Sponsoring Organizations (COSO) is a set of best practices for IT management.

True

False

A report indicating that a system's disk is 80 percent full is a good indication that something is wrong with that system.

True

False

Regarding log monitoring, false negatives are alerts that seem malicious but are not real security events.

True

False

Data loss prevention (DLP) uses business rules to classify sensitive information to prevent unauthorized end users from sharing it.

True

False

Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets in a traffic stream rather than justin individual packets.

True

False

Which regulatory standard would NOT require audits of companies in the United States?

Sarbanes-Oxley Act (SOX)

Personal Information Protection and Electronic Documents Act (PIPEDA)

Health Insurance Portability and Accountability Act (HIPAA)

Payment Card Industry Data Security Standard (PCI DSS)

In security testing, reconnaissance involves reviewing a system to learn as much as possible about the organization, its systems, and its networks.

True

False

Sarbanes-Oxley Act (SOX)

Personal Information Protection and Electronic Documents Act (PIPEDA)

Health Insurance Portability and Accountability Act (HIPAA)

Payment Card Industry Data Security Standard (PCI DSS)

In security testing, reconnaissance involves reviewing a system to learn as much as possible about the organization, its systems, and its networks.

True

False

Explanation / Answer

1. True

2. True

3. False : COSO is an organization to fight against corporate frauds.

4. Flase : 80 percent full disk activity indicates that disk activity is high. It does not represent anything wrong with the system.

5. False: In Log monitoring, flase negative alarms defines the situation when alarms does not ring on real attacks,

6. False: DLP is uses rules to classify business information to prevent authorised user from sharing it outside the company.

7. True

8.  Personal Information Protection and Electronic Documents Act (PIPEDA)

9. True