Appendix A. Answer Key

CHAPTER 1 The Need for Information Systems Security Compliance

  1. B

  2. Risk-based approach

  3. A

  4. A guide for assessing security controls

  5. D

  6. B

  7. Independent

  8. C

  9. A

  10. D

  11. E

  12. E

  13. D

  14. E

  15. Strict liability

CHAPTER 2 Overview of U.S. Compliance Laws

  1. A

  2. C

  3. Accreditation

  4. A

  5. B

  6. B

  7. C

  8. E

  9. D

  10. A

  11. B

  12. C

  13. B

  14. B

  15. F

CHAPTER 3 What Is the Scope of an IT Infrastructure Audit for Compliance?

  1. Gap

  2. C

  3. A

  4. A

  5. B

  6. C

  7. E

  8. B

  9. D

  10. Framework

  11. D

  12. A, B, and C

  13. A, B, and E

  14. Identity

CHAPTER 4 Auditing Standards and Frameworks

  1. Framework

  2. A

  3. B

  4. A, B, and C

  5. A

  6. B

  7. Goal

  8. B

  9. B

  10. B

  11. B

  12. Practice

  13. D

  14. C

  15. B

CHAPTER 5 Planning an IT Infrastructure Audit for Compliance

  1. E

  2. C

  3. B

  4. Threat

  5. C

  6. A

  7. D

  8. Scope

  9. A

  10. A

  11. E

  12. B

  13. A

  14. C

  15. D

CHAPTER 6 Conducting an IT Infrastructure Audit for Compliance

  1. A

  2. C

  3. B

  4. B

  5. Penetration test

  6. A

  7. A

  8. Computer assisted audit tools and techniques

  9. D

  10. A

  11. Management

  12. A

  13. A

  14. A

  15. C

CHAPTER 7 Writing the IT Infrastructure Audit Report

  1. A

  2. B

  3. B

  4. B

  5. Nonexistent ...

Get Auditing IT Infrastructures for Compliance now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.