Appendix A. Answer Key
CHAPTER 1 The Need for Information Systems Security Compliance
B
Risk-based approach
A
A guide for assessing security controls
D
B
Independent
C
A
D
E
E
D
E
Strict liability
CHAPTER 2 Overview of U.S. Compliance Laws
A
C
Accreditation
A
B
B
C
E
D
A
B
C
B
B
F
CHAPTER 3 What Is the Scope of an IT Infrastructure Audit for Compliance?
Gap
C
A
A
B
C
E
B
D
Framework
D
A, B, and C
A, B, and E
Identity
CHAPTER 4 Auditing Standards and Frameworks
Framework
A
B
A, B, and C
A
B
Goal
B
B
B
B
Practice
D
C
B
CHAPTER 5 Planning an IT Infrastructure Audit for Compliance
E
C
B
Threat
C
A
D
Scope
A
A
E
B
A
C
D
CHAPTER 6 Conducting an IT Infrastructure Audit for Compliance
A
C
B
B
Penetration test
A
A
Computer assisted audit tools and techniques
D
A
Management
A
A
A
C
CHAPTER 7 Writing the IT Infrastructure Audit Report
A
B
B
B
Nonexistent ...
Get Auditing IT Infrastructures for Compliance now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.