ISC CPA Exam

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/241

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:40 AM on 6/15/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

242 Terms

1
New cards

3 Primary Componenets to manage cyber security risk under the NIST Cybersecurity Framework

1. CSF Core

2. CSF Tiers

3. CSF Organization Profiles

2
New cards

6 NIST CSF framework cosre components

1. Govern

2. Identify

3. Protect

4. Detect

5. Respond

6. Recover

3
New cards

NIST CSF Tiers that apply to cybersecurity risk governance and cybersecurity risk management

Tier 1: Partial

Tier 2: Risk-Informed

Tier 3: Repeatable

Tier 4: Adaptive

4
New cards

Current Profile

Specifies the outcome that an organization is acheiving(or attempting to achieve) based in the current cybersecurity posture.

5
New cards

Target Profile

specified the desired outcome that an organization prioritized acheving, considering the anticipated changes to the organization's cybersecurity posture

6
New cards

Gap Analysis

identified differences between current state and future state

7
New cards

5 NIST Privacy FRamework Core Functions

1. Identify-P

2.Govern-P

3. Control-P

4. Communicate-P

5.Protect-P

8
New cards

What are the three control implementation approaches that are to be implemented on a per-control basis with respect to implementation models?

1. Common(inheritable)

2. System-Specific

3. Hybrid

9
New cards

Common (inheritable)

Implement controls at the organizational level, which are adopted by information systems

10
New cards

System-Specific

Implement controls at the information system level

11
New cards

Hybrid

Implement controls at the organization level where appropraite and the remainder at the information system level.

12
New cards

2 categries of Data Breaches

1. Unintentional

2. Intentional

13
New cards

Unintentional Data Breach

a breach resulting from negligence or error

14
New cards

intentional data breach

a breach resulting from bad actors illegally gaining access to data

15
New cards

3 categories of safeguards for covered entities or business associates under HIPAA

1. Administrative

2. Physical

3. Technical

16
New cards

What are the principles that must be followed when processing data in compliance with GDPR?

- Lawfulness, Fairness, Transparency

- Purpose Limitation

- Data Minimization

- Accuracy

- Storage Limitation

- Integrity and Confidentiality

All processors or controllers of data shall be responsible for—and able to demonstrate compliance with—these principles (accountability).

17
New cards

6 goals of PCI DSS

1. Build and maintain a secure network and systems

2. Protect account data

3. Maintain a vulnerability management program

4. Implement strong access control measures

5. Regularly monitor and test networks

6. Maintain an information security policy

18
New cards

Control 01: Inventory and Control of Enterprise Assets.

Actively manage all enterprise assets connected to the infrastructure physically, virtually, remotely, and those within cloud environments, to accurately know the totality of assets that need to be monitored and protected within the enterprise.

19
New cards

Control 02: Inventory and Control of Software Assets.

Actively manage all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution.

20
New cards

Control 03: Data Protection.

Develop processes and technical controls to identify, classify, securely handle, retain, and dispose of data.

21
New cards

Control 04: Secure Configuration of Enterprise Assets and Software.

Establish and maintain the secure configuration of enterprise assets and software.

22
New cards

Control 05: Account Management.

Use processes and tools to assign and manage authorization to credentials for user accounts, including administrator accounts, as well as service accounts, to enterprise assets and software.

23
New cards

Control 06: Access Control Management.

Use processes and tools to create, assign, manage, and revoke access credentials and privileges for user, administrator, and service accounts for enterprise assets and software.

24
New cards

Control 07: Continuous Vulnerability Management.

Develop a plan to continuously assess and track vulnerabilities on all enterprise assets within the enterprise's infrastructure, in order to remediate, and minimize, the window of opportunity for attackers. Monitor public and private industry sources for new threat and vulnerability information.

25
New cards

Control 08: Audit Log Management.

Collect, alert, review, and retain audit logs of events that could help detect, understand, or recover from an attack.

26
New cards

Control 09: Email and Web Browser Protections.

Improve protections and detections of threats from email and web vectors, as these are opportunities for attackers to manipulate human behavior through direct engagement.

27
New cards

CIS Controls Principles

1. Context

2. Coexistence

3. Consistency

28
New cards

Context

An enhancement to the scope and practical applicability of safeguards through incorporation of examples and explanations

29
New cards

Coexistence

Alignment wth evolving industry standards and frameworks, including NIST's CSF 2.0 Framework

30
New cards

Consistency

Disruption to controls users are minimized, not impacting implementation groups

31
New cards

Control 10: Malware Defenses.

Prevent or control the installation, spread, and execution of malicious applications, code, or scripts on enterprise assets.

32
New cards

Control 11: Data Recovery.

Establish and maintain data recovery practices sufficient to restore in-scope enterprise assets to a pre-incident and trusted state.

33
New cards

Control 12: Network Infrastructure Management.

Establish, implement, and actively manage network devices in order to prevent attackers from exploiting vulnerable network services and access points

34
New cards

Control 13: Network Monitoring and Defense.

Operate processes and tooling to establish and maintain comprehensive network monitoring and defense against security threats across the enterprise's network infrastructure and user base.

35
New cards

Control 14: Security Awareness and Skills Training.

Establish and maintain a security awareness program to influence behavior among the workforce to be security conscious and properly skilled to reduce cybersecurity risks to the enterprise.

36
New cards

Control 15: Service Provider Management.

Develop a process to evaluate service providers who hold sensitive data, or are responsible for an enterprise's critical IT platforms or processes, to ensure these providers are protecting those platforms and data appropriately.

37
New cards

Control 16: Application Software Security.

Manage the security life cycle of in-house developed, hosted, or acquired software to prevent, detect, and remediate security weaknesses before they can impact the enterprise.

38
New cards

Control 17: Incident Response Management.

Establish a program to develop and maintain an incident response capability to prepare, detect, and quickly respond to an attack

39
New cards

Control 18: Penetration Testing.

Test the effectiveness and resiliency of enterprise assets through identifying and exploiting weaknesses in controls (people, processes, and technology), and simulating the objectives and actions of an attacker.

40
New cards

ISACA's COBIT framework purpose

provides a roadmap that organizations can use to implement best practices for IT governance and management

41
New cards

5 components were used for the development of COBIT 2019's foundation

- COBIT 5

- Six principles for a governance system

- Three principles for a governance framework

- Other standards and regulations

- Community contribution

42
New cards

6 governance priinicples under COBIT 2019

1. Provide Stakeholder Value

2. Holistic Approach

3. Dynamic Governance System

4. Governance Distinct From Management

5. Tailored to Enterprise Needs

6. End-to-End Governance System

43
New cards

3 principles used to develop the COBIT 2019 core model.

1. Based in Conceptual Model

2. Open and Flexible

3. Aligned to major standards

44
New cards

Based on Conceptual Model

Governance frameworks should identify key components as well as the relationships between those components in order to provide for greater automation and to maximize consistency

45
New cards

Open and Flexible

Frameworks should have the ability to change, adding relevant content and removing irrelevant content, while keeping consistency and integrity

46
New cards

Aligned to Major Standards

Frameworks should align with regulations, frameworks, and standards

47
New cards

7 components to satisfy management and governance objectives under the COBIT 2019 core model

1. Processes

2. Organizational Structures

3. Principles, Policies, Frameworks

4. Information

5. Culture, Ethics, and Behavior

6. People, Skills, and Competencies

7. Services, Infrastructure, and Applications

48
New cards

11 Design Factors under COBIT

- Enterprise Strategy

- Enterprise Goals

- Risk Profile

- Information and Technology Issues

- Threat Landscape

- Compliance Requirements

- Role of IT

- Sourcing Model for IT

- IT Implementation Methods

- Technology Adoption Strategy

- Enterprise Size

49
New cards

Governance Objectives under COBIT 2019

Evaluate, Direct, and Monitor (EDM)

50
New cards

Management Objectives under COBIT 2019

- Align, Plan, and Organize (APO)

- Build, Acquire, and Implement (BAI)

- Deliver, Service, and Support (DSS)

- Monitor, Evaluate, and Assess (MEA)

51
New cards

management under COBIT framework

Management is responsible for the daily planning and administration of company operations, such as executive officers.

52
New cards

governance under COBIT framework

Governance is responsible for evaluating strategic objectives, directing management to achieve those objectives, and monitoring whether objectives are being met.

53
New cards

Computer Hardware

Computers, the physical components that comprise computers, computer-related equipment, and external peripheral devices are referred to as computer hardware (or just "hardware").

54
New cards

End-User Devices (EUDs)

Electronic machines, typically computers or microcomputers, that directly interact with employees or consumers at the "edge" of a network.

55
New cards

Non-EUDs (non-end-user devices) examples

- Switches

- Servers

- Routers

- other network support devices

56
New cards

Infrastructure Housing

The facilities and the safeguards on those facilities that contain hardware. Examples include data centers or offices, which may include advanced security systems to monitor and control access.

57
New cards

Traditional Hardware examples

1. Modems

2. Routers

3. Switches

4. Gateways

5. Edge-Enabled Devices

6. Servers

7. Firewalls

58
New cards

Modems

Connect a network to an internet service provider's network

59
New cards

Routers

manage network traffic by connecting devices to form a network

60
New cards

Switches

connect and divide devices within a computer network

61
New cards

Gateways

a computer or device that acts as an intermediary between different networks

62
New cards

Edge-enabled devices

Allow computing, storage, and networking functions closer to the devices where the data or system request originates, rather than a distant central location.

63
New cards

Servers

physical or virtual machines that coordinate the computers, programs, and data that are part of the network

64
New cards

Firewalls

Software applications or hardware devices that protect a person's or a company's network trafffice by filtering it through security proticols with predefined rules

65
New cards

7 layers for specific data exchange in an OSI Model

1. Physical (Layer 1)

2. Data Link (Layer 2)

3. Network (Layer 3)

4. Transport (Layer 4)

5. Session (Layer 5)

6. Presentation (Layer 6)

7. Application (Layer 7)

66
New cards

common network architechure designs

Local-Area Networks (LANs)

Wide-Area Networks (WANs)

Software-defined Wide Area Networks (SD-WANs)

Virtual Private Networks (VPNs)

Demilitarized Zone (DMZ)

67
New cards

Local-Area Networks (LANs)

provides network access to a limited geographic area

68
New cards

Wide-Area Networks (WANs)

connect multiple LANs to provide access to larger geographic areas

69
New cards

Software-defined Wide Area Networks (SD-WANs)

monitors the performance of WAN connections and manages traffic to optimize connectivity

70
New cards

Virtual Private Networks (VPNs)

Virtual connections through a secure channel or tunnel that provide remote and secure access to an existing network

71
New cards

Demilitarized Zone (DMZ)

provides an additional layer of security to an organization's LAN by creating a physical or logical subnetwork outside of the LAN's firewall to house the organization's external facing resources to an untrusted network such as the internet. The setup of the DMZ typically involves at least two firewalls: one firewall to separate the DMZ from the internet and another firewall to separate the DMZ from the LAN.

72
New cards

3 Cloud Computing Models

1. IaaS - infrastructure as a services

2. PaaS - platform as a service

3. SaaS - software as a service

73
New cards

IaaS (Infrastructure as a Service)

access to networking, computers and storage

74
New cards

PaaS (Platform as a Service)

just manage app not hardware or OS

75
New cards

SaaS (Software as a Service)

no inf nor app mgmt just configure and use

76
New cards

What is the purpose of COSO's Enterprise Risk Management for Cloud Computing publication?

The publication provides specific guidance to organizations for applying the COSO framework to cloud computing. In general, an organization must integrate the governance of cloud computing into its overall risk management strategy.

77
New cards

enterprise resource planning (ERP) systems

Cross-functional systems that support different business functions and facilitate the integration of information across departments such as accounting, customer management, finance, human resources, inventory management, manufacturing, marketing, and vendor management. An ERP may include accounting information system (AIS) capabilities while being more robust than a standalone AIS and integrated with other departments.

78
New cards

3 subsystems of the Accounting Information System (AIS)

- Transaction Processing System (TPS)

- Financial Reporting System (FRS)

- Management Reporting System (MRS)

79
New cards

objectives of the AIS subsystem

- Record valid transactions.

- Properly classify those transactions.

- Record transactions at their correct value.

- Record transactions in the correct accounting period.

- Properly present transactions and related information in the financial statements.

80
New cards

Transaction cycles in accounting department

- Revenue and cash collections cycles

- Purchasing and disbursement cycles

- Human resources and payroll cycles

- Production cycles

- Fixed asset cycles

- Treasury cycles

- General ledger and reporting cycles

81
New cards

Areas of process improvement that enhance AIS performance

- Automation

- Shared services

- Outsourcing

- Offshore operations

82
New cards

Processing Integrity

Processing integrity refers to a system's ability to initiate and complete transactions so that they are valid, accurate, completed timely, and authorized to meet an organization's objective.

83
New cards

How does the AICPA define a deficiency in the operation of a control in a SOC 2® engagement?

A properly designed control that either:

does not operate as designed; or

is performed by a person who lacks authority or competence to perform the control effectively.

84
New cards

When considering the identification of deviations in the operating effectiveness of controls, what should the service auditor consider?

The service auditor should accumulate documentation of deviations in the operating effectiveness of controls discovered.

If the service auditor cannot obtain reasonable assurance that system requirements or service commitments are being met, then the deficiency should be considered material.

85
New cards

When implementing the COSO's controls in a blockchain setting, what should an organization consider?

- Focus on preventative controls due to the volume and speed of transactions being processed.

- Increase the frequency of detective controls, also due to the volume of transactions.

- Develop controls that use other analytic technology like AI tools.

- Develop a code of conduct and establish policies that comply with KYC and AML.

- Create cross-disciplinary teams with segregation of duties and clear reporting lines in mind.

86
New cards

steps in a disaster recovery plan

1. Assess the risks

2. ID mission-critical applications and data

3. Develop a plan

4. Determine responsibilities of the personnel

5. Test the disaster recovery plan

87
New cards

Cold Site

Located off-site, connections are in place, equipment is not in place, typically takes 1-3 days to be operational, and is the cheapest.

88
New cards

Warm Site

Located off-site, connections are/are not in place, equipment is/is not in place, typically takes 0-3 days to be operational, and is moderately expensive.

89
New cards

Hot Site

Located off-site, connections are in place, equipment is in place, typically immediate to be operational, and is the most expensive.

90
New cards

Business Continuity Plan considerations

- Identify the organization's key business processes.

- Identify the risks that exist in key business processes.

- Determine the acceptable downtime for key business processes.

- Implement mitigation and contingency plans to address risks and downtimes.

91
New cards

Failed IT Structure

The availability of systems may directly be affected by failures in hardware, software, and network applications.

92
New cards

Insufficient Capacity and Resources

System availability may be slowed down or disrupted if the infrastructure is unable to meet the processing or storage needs.

93
New cards

Lack of Business Resiliency

Organizations may lose critical, confidential, or private data if a business resiliency program is insufficient/nonexistent.

94
New cards

Examples of system availability controls

- Physical controls

- IT infrastructure controls

- Uninterrupted power supply (UPS)

- Redundancy

- System backup (full, incremental, or differential)

95
New cards

Change management

is used to describe the policies, procedures, and resources employed to govern change in an organization.

96
New cards

forms of computing environments

- Development environment

- Testing environment

- Staging environment

- Production environment

- Disaster recovery environment

97
New cards

risks that exist pertaining to the selection and acquisition of software

- Lack of expertise

- Lack of a formal selection and acquisition process

- Software/hardware vulnerability and compatibility

98
New cards

integration risks during the change management process

- User resistance

- Lack of management support

- Lack of stakeholder support

- Resource concerns

- Business disruption

- Lack of system integration

99
New cards

examples of outsourcing risks during the change management process

- Lack of organizational knowledge

- Uncertainty of the third party's knowledge and management

- Lack of security

100
New cards

procedures to test change management controls for IT resources

- Establish acceptance criteria.

- Analyze logs.

- Evaluate the results.

- Monitor.

- Test using continuous adoption.