GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

A company makes full backups every Friday night and partial…

A company makes full backups every Friday night and partial backups on Mondays, Tuesdays, Wednesdays, and Thursdays.  Based on that backup schedule, which of the following statements is true?

Read Details

A company makes full backups every Friday night and partial…

A company makes full backups every Friday night and partial backups on Mondays, Tuesdays, Wednesdays, and Thursdays.  Based on that backup schedule, which of the following statements is true?

Read Details

Which of the following was not one of the principles used wh…

Which of the following was not one of the principles used when developing the COBIT framework?

Read Details

The audit firm of Barden and Bella (B&B) is conducting a fin…

The audit firm of Barden and Bella (B&B) is conducting a financial statement audit which includes internal controls over financial reporting for the time period of January 1, 2023 to December 31, 2023 for one of its clients. The client outsources a material portion of its IT processing to Das Sound Machine (DSM).  As part of B&B’s procedures regarding the assessment of internal controls over financial reporting at its client, which of the following System and Organization Control (SOC) reports would be most beneficial for B&B to receive from DSM?

Read Details

Which of the following is a correct statement regarding the…

Which of the following is a correct statement regarding the relationship between the COSO and COBIT frameworks?  Check all that apply.

Read Details

Which month had the highest count of changes opened? [month]

Which month had the highest count of changes opened? [month]

Read Details

Which month had the lowest (i.e. shortest) average number of…

Which month had the lowest (i.e. shortest) average number of days from the date of implementation to the date of post-implementation review? The Senior Consultant on the engagement informs you that a calculation of DATEDIFF(‘day’,[Implementation Date],[Post-Implementation Review],’sunday’) can be helpful in addressing the question. [month]

Read Details

Tableau Problem #1 – Use the following information to answer…

Tableau Problem #1 – Use the following information to answer questions 31 through 40. You have been asked to help perform some procedures related to a Network Vulnerability Scan engagement.  Specifically, your team has been asked to identify, assess, and report on potential security weaknesses within the client’s network infrastructure.  Your portion of the engagement is focused on analyzing network login activity logs to identify any unusual activity that may have occurred.  The data you receive from the company is broken out as follows: Network Logs worksheet with the following data fields: Network Login ID: number that uniquely identifies each network log in (100234001) Date: date the log in occurred in month/day/year format (10/1/2024) Time: time stamp the log in occurred in hour/minute/second 12-hour format (4:24:39 AM) Employee Number: number that uniquely identifies the employee who logged into the network (EE079238) Office Location:  office location name related to the Employee Number (Secondary Campus – Atlanta) Day of the Week:  day of the week of the network login (Wednesday) IP Address:  number that uniquely identifies the IP Address of the device used to log into the network (34659328) IP Address City:  name of the city that the IP Address originates from (Atlanta) IP Address County:  name of the country that the IP Address originates from (United States of America) Specifically, you are to: download and save the following data ‘Client Network Log Data.xlsx’;  look through the data in Excel – this will help you become familiar with the data connect Tableau to the data;  there are 9 fields with 29,800 rows in the data – before beginning, please double check the ‘Data Source’ tab in Tableau to ensure all data has been loaded In order to perform certain distinct counts you will need to duplicate the ‘Network Login ID’ dimension and the ‘Employee Number’ dimension and convert those duplicates into measures.  In addition, if using the ‘Employee Number’ dimension, Tableau may pop-up a warning message stating the recommended maximum number for the shelf is 1,000.  If this warning message appears, go ahead and click on ‘Add all members’.  This will ensure all available data is analyzed. using Tableau, answer the questions that follow; and delete the data file once finished.

Read Details

Your firm has been hired to help map a client’s control acti…

Your firm has been hired to help map a client’s control activities to the appropriate National Institute of Standards and Technology (NIST) Control Family in the NIST 800-53 framework.  The client’s control is that the IT Department periodically scans the network for vulnerabilities.  This control best matches the description of which of the following NIST 800-53 Control Families?

Read Details

Which of the following is an example of external fraud?

Which of the following is an example of external fraud?

Read Details

Posts pagination

Newer posts 1 … 37,325 37,326 37,327 37,328 37,329 … 77,620 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top