- 论坛徽章:
- 0
|
也许大家看到买书的广告很烦,但如果是isaca的测试题呢?
CE Quiz # 87 \r\n节选自Information Systems Control Journal Volume 6, 2002 (双月刊)\r\n我手头还有2003年第1期的杂志和Quiz#88,有时间再贴上来。\r\n\r\n顺便再做一下广告,有Knet密码,可以看到 1995第5期到 2002 年第6期的测试题(如果需要今年的,我可以代为录入)。\r\n\r\n\r\n\r\n\r\nCE Quiz # 87 \r\nBased on Information Systems Control Journal Volume 6, 2002 \r\nA passing score of 75 percent qualifies for one (1) hour of CISA continuing education credit.\r\nThis quiz requires a JavaScript-enabled browser.\r\nYour results will appear in a new window.\r\n\r\nSarup Article\r\n1. Reasons cited by the author for failure of transformation change efforts include overcommunicating to the troops and ineffective leadership in driving change.\r\nTrue False \r\n\r\n2. Control principles important in a governance framework for a change program include a project plan and charter, a tracking mechanism for monitoring the progress against plan, and a process to solicit feedback and address changes, among others.\r\nTrue False \r\n\r\n3. Information technology generally is not germane to a transformational change effort.\r\nTrue False \r\n\r\nGuldentops and De Haes Article\r\n4. COBIT is more likely to be used by smaller enterprises than larger ones, according to a survey conducted by ISACA and the IT Governance Institute.™\r\nTrue False \r\n\r\n5. After COBIT, the most popular control methodologies in use among survey participants include COSO and ISO 9000.\r\nTrue False \r\n\r\nGuldentops, Van Grembergen and De Haes Article\r\n6. Among industries, organizations responding to the ISACA and IT Governance Institute survey cited by the authors that had the most mature controls and governance program were in the retail and financial services industries.\r\nTrue False \r\n\r\n7. Among geographies, organizations responding to the ISACA and IT Governance Institute survey cited by the authors that had the most mature controls and governance program were in the Americas and Europe.\r\nTrue False \r\n\r\nCaldwell Article\r\n8. Security event management software is designed to correlate security event log data across multiple types of security devices. \r\nTrue False \r\n\r\n9. To create a security event chain and correlate security event log data, systems must move security data to a consolidation point, they must be normalized to a common log format, and they must be reduced so they can be correlated more efficiently. \r\nTrue False \r\n\r\n10. The following basic fields are among those most likely to be used for data correlation by security event management software: geography of device, device type and time threshold.\r\nTrue False \r\n\r\nHasan Article\r\n11. Benford\'s Law is based on certain assumptions about numbers that result from the same phenomenon. It states that the digits 1 through 9 are not equally likely to appear as a leading digit in multidigit numbers resulting from the phenomenon.\r\nTrue False \r\n\r\n12. Examples of Benford\'s Law occurring in population statistics are that the number 9 is twice as likely to occur as a leading digit than the number 2 or 3. \r\nTrue False \r\n\r\n13. Datasets must satisfy several conditions before applying Benford\'s Law. Some of these conditions include: the numbers must not be affected by minimum or maximum values, the numbers must occur naturally but not be assigned and the numbers must be related in some way.\r\nTrue False \r\n\r\nStasiak Article\r\n14. The first phase of a web application review is the crawl state, where the reviewer gathers information about the application under review.\r\nTrue False \r\n\r\n15. Tools identified by the author for the attack phase of a web application review include AppScan, WebInspect and ScanDo.\r\nTrue False \r\n\r\nGreene Article\r\n16. Standard-setting bodies that have published standards for application security include ISO, AICPA, ISACA and NIST. \r\nTrue False \r\n\r\n============================================================================\r\n\r\n\r\n\r\n结果分析\r\n\r\n\r\nCPE Quiz #87 Results\r\nPrint this page to save your results.\r\n\r\nSarup Article\r\n1. Reasons cited by the author for failure of transformation change efforts include overcommunicating to the troops and ineffective leadership in driving change.\r\n\r\nThe correct answer is False. Question not answered.\r\n\r\n2. Control principles important in a governance framework for a change program include a project plan and charter, a tracking mechanism for monitoring the progress against plan, and a process to solicit feedback and address changes, among others.\r\n\r\nThe correct answer is True. Question not answered.\r\n\r\n3. Information technology generally is not germane to a transformational change effort.\r\n\r\nThe correct answer is False. Question not answered.\r\n\r\nGuldentops and De Haes Article\r\n4. COBIT is more likely to be used by smaller enterprises than larger ones, according to a survey conducted by ISACA and the IT Governance Institute.™\r\n\r\nThe correct answer is False. Question not answered.\r\n\r\n5. After COBIT, the most popular control methodologies in use among survey participants include COSO and ISO 9000.\r\n\r\nThe correct answer is True. Question not answered.\r\n\r\nGuldentops, Van Grembergen and De Haes Article\r\n6. Among industries, organizations responding to the ISACA and IT Governance Institute survey cited by the authors that had the most mature controls and governance program were in the retail and financial services industries.\r\n\r\nThe correct answer is False. Question not answered.\r\n\r\n7. Among geographies, organizations responding to the ISACA and IT Governance Institute survey cited by the authors that had the most mature controls and governance program were in the Americas and Europe.\r\n\r\nThe correct answer is False. Question not answered.\r\n\r\nCaldwell Article\r\n8. Security event management software is designed to correlate security event log data across multiple types of security devices. \r\n\r\nThe correct answer is True. Question not answered.\r\n\r\n9. To create a security event chain and correlate security event log data, systems must move security data to a consolidation point, they must be normalized to a common log format, and they must be reduced so they can be correlated more efficiently. \r\n\r\nThe correct answer is True. Question not answered.\r\n\r\n10. The following basic fields are among those most likely to be used for data correlation by security event management software: geography of device, device type and time threshold.\r\n\r\nThe correct answer is True. Question not answered.\r\n\r\nHasan Article\r\n11. Benford\'s Law is based on certain assumptions about numbers that result from the same phenomenon. It states that the digits 1 through 9 are not equally likely to appear as a leading digit in multidigit numbers resulting from the phenomenon.\r\n\r\nThe correct answer is True. Question not answered.\r\n\r\n12. Examples of Benford\'s Law occurring in population statistics are that the number 9 is twice as likely to occur as a leading digit than the number 2 or 3. \r\n\r\nThe correct answer is False. Question not answered.\r\n\r\n13. Datasets must satisfy several conditions before applying Benford\'s Law. Some of these conditions include: the numbers must not be affected by minimum or maximum values, the numbers must occur naturally but not be assigned and the numbers must be related in some way.\r\n\r\nThe correct answer is True. Question not answered.\r\n\r\nStasiak Article\r\n14. The first phase of a web application review is the crawl state, where the reviewer gathers information about the application under review.\r\n\r\nThe correct answer is False. Question not answered.\r\n\r\n15. Tools identified by the author for the attack phase of a web application review include AppScan, WebInspect and ScanDo.\r\n\r\nThe correct answer is True. Question not answered.\r\n\r\nGreene Article\r\n16. Standard-setting bodies that have published standards for application security include ISO, AICPA, ISACA and NIST. \r\n\r\nThe correct answer is True. Question not answered.\r\n\r\nYour score is 0%. (0/16)\r\nA passing score of 75 percent qualifies for one (1) hour of CISA continuing education credit. Please confirm with other designation-granting professional bodies for their CPE qualification acceptance criteria. |
|