438 Appendix ■ Answers
5 9. D. Remote journaling transfers transaction logs to a remote site on a more frequent basis
than electronic vaulting, typically hourly. Transaction logging is not a recovery technique
alone; it is a process for generating the logs used in remote journaling. In an electronic
vaulting approach, automated technology moves database backups from the primary
database server to a remote site on a scheduled basis, typically daily. Remote mirroring
maintains a live database server at the backup site and mirrors all transactions at the
primary site on the server at the backup site.
- C. The Waiting state is used when a process is blocked waiting for an external event. The
Running state is used when a process is executing on the CPU. The Ready state is used
when a process is prepared to execute, but the CPU is not available. The Stopped state is
used when a process terminates. - B. Operational investigations are performed by internal teams to troubleshoot
performance or other technical issues. They are not intended to produce evidence for use
in court and, therefore, do not have the rigid collection standards of criminal, civil, or
regulatory investigations. - A. Nondisclosure agreements (NDAs) are designed to protect the confidentiality of an
organization’s data, including trade secrets during and after the person’s employment.
NDAs do not protect against deletion or availability issues, and noncompete agreements
would be required to stop competition. - C. Adding a second factor can ensure that users who might be incorrectly accepted are
not given access due to a higher than desired false acceptance rate (FAR) from accessing
a system. The CER is the crossover between the false acceptance and false rejection rate
(FRR) and is used as a way to measure the accuracy of biometric systems. Changing the
sensitivity to lower the FRR may actually increase the FAR, and replacing a biometric
system can be expensive in terms of time and cost. - The SOC levels match the report descriptions as follows:
- SOC 1, Type 1: D. A report that provides the auditor’s opinions of financial state-
ments about controls at the service organization and that includes a report on the
opinion on the presentation of the service organization’s system as well as suitability
of the controls. - SOC 1, Type 2: C. A report that provides an assessment of the risk of material mis-
statement of financial statement assertions affected by the service organization’s pro-
cessing and that includes a description of the service auditor’s tests of the controls and
the results of the tests and their effectiveness. - SOC 2: B. A report that provides predefined, standard benchmarks for controls
involving confidentiality, availability, integrity, and privacy of a system and the infor-
mation it contains, generally for restricted use. - SOC 3: A. A general use report that reports on controls related to compliance and/or
operations.
- SOC 1, Type 1: D. A report that provides the auditor’s opinions of financial state-
- D. Over-the-shoulder reviews require the original developer to explain her code to a peer
while walking through it. Email pass-around code reviews are done by sending code for