Central Washington University Accounting Questions

1) This document shows changes in the interest of the company’s shareholders over time.A. Balance sheet
B. Cash flow statements
C. Statement of shareholders’ equity
D. Income statement
2) This financial statement is broken into 3 sections consisting of operating activities, investing activities,
financial activities.
A. Cash flow statement
B. Balance sheet
C. Income statement
D. Statement of shareholders’ equity
3) Significant changes or upgrades in IS Program framework or architecture is an example of:
A. Medium term goals
B. Short term goal
C. None 1of the listed choices are correct
D. Long term goals
4) Of the three roles that CISOs must understand and interact with to build support for their information
security program, which has the highest level of input?
A. Stakeholders
B. Influencers
C. Sponsors
D. User
5) When developing an information security program, a ______ is anyone who has an interest in the
outcome of the information security program.
A. Stakeholders
B. Influencers
C. User
D. Sponsors
6) In contract negotiation, the agreement about which party assumes responsibility for the security
incidents and penalties related to such an event is known as:
A. Performance management
B. Audit
C. Indemnity
D. Security
7) When developing and information program a _______ is someone who can essentially make or break
the program, they benefit directly and typical authorize or fund the program.
A. Influencer
B. Sponsor
C. User
D. Stakeholder
8)This is the process where an organization issues attender or bid to anyone to purchase a product or
service.
A. Bid requirements
B. Informal bidding
C. Procurement authority
D. Formal bidding
9) A cybersecurity architecture uses views or layers of the whole design o represent areas of the design
specific to certain stakeholders. Which view answers the question “why are we doing this?”
A. Technical view
B. Implementation view
C. Business view
D. Functional view
10) Improvements in policies, procedures or processes that can resolve gaps in control strategies is an
example of:
A. Long term goals
B. Medium term goals
C. None of the listed choices are correct
D. Short term goals
11) To be a successful CISO within an organization and work with senior management you must have
considerable understanding in informal security and ______?
A. People skills
B. Financial management
C. Accounting
D. Operations management
12) A scorecard is part of an information security strategic plan. It is divided into the following areas:
A. Key risk indicator (KRIs)
B. Financial accounting of the IS program’s budget
C. Key performance indicators
D. All listed choices are correct.
13) When determining the total cost of a contract a CISO must take into account the cost of the contract
and _____
A. In house resources used
B. None of the listed choices are correct
C. Travel expenses
D. Financial cost
14) How would vendor financing be accounted for in the information security budget?
A. OpEx
B. Liability
C. CapEx
D. Asset
15) When managing a budget what must a CISO be cognizant of in case the budget is cut?
A. OpEx
B. Discretionary spending
C. CapEx
D. Revenue
16) What is the purpose of contract administration?
A. To ensure those with signature approval are involved
B. To ensure effective delivery and adherence to contractual terms
C. To get the best possible pricing
D. To ensure the contact meets your requirements.
17) Which financial statement would include the value of patents and trademarks?
A. Statements of shareholders’ equity
B. Balance Sheet
C. Cash flow statement
D. Income statement
18)Which financial statement would tell you how much money a
company received from selling additional units of its own stock?
A. Balance sheet
B. Income statement
C. Statements of shareholders’ equity
D. Cash flow statement

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER