Reader small image

You're reading from  ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide

Product typeBook
Published inSep 2023
PublisherPackt
ISBN-139781803236902
Edition1st Edition
Right arrow
Author (1)
Shobhit Mehta
Shobhit Mehta
author image
Shobhit Mehta

Shobhit Mehta is the Security and Compliance Director at Headspace, an on-demand mental health company in San Francisco, CA. Previously, he worked in different facets of security and assurance with HSBC, Deutsche Bank, Credit Suisse, PayPal, and Fidelity Investments. He also works with ISACA to develop exam questions for CISA, CISM, and CGEIT, served as the technical reviewer for the CGEIT and CISA review manuals, and is a published author for the COBIT 5 journal. He completed his MS in cybersecurity at Northeastern University, Boston, and holds CRISC, CISM, CISA, CGEIT, CISSP, and CCSP certifications. In his spare time, he likes to explore the inclined trails of the Bay Area, complete ultramarathons, and blog on GRCMusings.
Read more about Shobhit Mehta

Right arrow

Review questions

  1. Networking devices, storage, and software are components of:
    1. Business architecture
    2. Technology architecture
    3. Data architecture
    4. Application architecture
  2. Which of the following is not a property of the Defined process of the Capability Maturity Model?
    1. Well characterized and understood
    2. Defined at the organizational level
    3. Proactive
    4. Unpredictable
  3. Which of the following is Layer 3 of the TCP/IP model?
    1. Physical
    2. Data link
    3. Network
    4. Application
  4. Which of the following is Layer 5 of the OSI model?
    1. Physical
    2. Application
    3. Session
    4. Transport
  5. Which of the following technologies provides a secure tunnel to log in remotely to a corporate network?
    1. Intrusion Detection System
    2. Intrusion Prevention System
    3. Virtual Private Network
    4. Domain Network System
  6. Which of the following protocols is used to implement a VPN?
    1. DNS
    2. IPSec
    3. SSL
    4. SSO
  7. Which of the following is an example of on-demand compute, network, and storage computing services?
    1. Platform as a Service (PaaS)
    2. Software as a Service (SaaS)
    3. Infrastructure...
lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide
Published in: Sep 2023Publisher: PacktISBN-13: 9781803236902

Author (1)

author image
Shobhit Mehta

Shobhit Mehta is the Security and Compliance Director at Headspace, an on-demand mental health company in San Francisco, CA. Previously, he worked in different facets of security and assurance with HSBC, Deutsche Bank, Credit Suisse, PayPal, and Fidelity Investments. He also works with ISACA to develop exam questions for CISA, CISM, and CGEIT, served as the technical reviewer for the CGEIT and CISA review manuals, and is a published author for the COBIT 5 journal. He completed his MS in cybersecurity at Northeastern University, Boston, and holds CRISC, CISM, CISA, CGEIT, CISSP, and CCSP certifications. In his spare time, he likes to explore the inclined trails of the Bay Area, complete ultramarathons, and blog on GRCMusings.
Read more about Shobhit Mehta