Take the quiz online
Based on Volume 1, 2016
Value: 1 Hour of CISA/CISM/CGEIT/CRISC Continuing Professional Education (CPE) Credit
TRUE OR FALSE
1 The COBIT® 5 Assessment Programme
incorporates the COBIT 5 Process Reference
Model and ISO/IEC 27110 as the basis for
the measurement framework and assessment
2 Capability level 1 indicators are specific
for each process and assess whether
the implemented process achieves its
3 At level 3, process documentation has to
specify who is responsible for its design
(process owner) and its scope; roles;
Responsible, Accountable, Consulted
and Informed (RACI) chart; and internal
4 Accenture is a global giant in technology
services with more than 500,000
5 In the Accentures case, the team increased
the number of IT audits provided by more
than 250 percent between 2012 and 2015.
6 While digital technology enabled many of the
performance improvements, just as critical
are the changes in mind-set that were made
throughout the process.
7 One lesson learned is to make cautious
decisions to drive step-driven increases in the
8 The Global State of Information Security
Survey in September 2014 shows that as
information risk factors have evolved, security
strategies have kept pace.
9 The US National Institute of Standards and
Technology’s (NIST) Special Publication
(SP) 800-53, Recommended Security
Controls for Federal Information Systems and
Organization identifies 198 security practices.
10 Executive Order 13636, Improving Critical
Infrastructure Cybersecurity, directs NIST to
work with stakeholders to develop a voluntary
framework for reducing cyberrisk to critical
11 Data visualization is about being simple and
representing data effectively.
12 A bubble chart is an engaging way to
visualize the frequency distribution of words
with textual data.
13 A heat map is a grouping of line charts copied
and pasted together.
14 A doughnut chart is basically a pie chart with
a hole in the middle.