ISC CPA Exam: How to Obtain an Understanding of How a Service Organization Provides Its Users Information on How to Report on a System Subject to a SOC 2 Engagement
ISC CPA Exam: How to Obtain an Understanding of the System Addressed by a SOC 2 Engagement, Including the Boundaries of the System
ISC CPA Exam: Understanding Requirements About Obtaining Management’s Written Representations in a SOC 1 or SOC 2 Engagement
ISC CPA Exam: Understanding the Purpose of Complementary User Entity Controls (CUECs) Identified by Service Organization Management in their System Description
ISC CPA Exam: Understanding the Description Criteria for Management’s Description of an Entity’s Cybersecurity Risk Management Program
ISC CPA Exam: Understanding the Purpose and Common Sections of a System Description Subject to SOC 1 or SOC 2 Engagements
ISC CPA Exam: Understanding the Impact of Subsequently Discovered Facts on a SOC 1 or SOC 2 Engagement
ISC CPA Exam: Understanding Service Commitments and System Requirements in a SOC 2 Engagement and How They Correspond to the Trust Services Criteria
ISC CPA Exam: Understanding the Considerations for Deciding Between and Use of, the Inclusive and Carve-Out Method for Subservice Organizations and CSOCs
ISC CPA Exam: Understanding the Risk Assessment Requirements for a Service Organization and the Service Auditor
ISC CPA Exam: Understanding How Materiality is Determined and Used in Performing a SOC 1 or SOC 2 Engagement
ISC CPA Exam: Understanding the Independence Considerations Between the Service Auditor, Service Organization, and Subservice Organizations
ISC CPA Exam: How to Identify Management Assertions Specific to the Different Categories and Types of SOC Engagements
ISC CPA Exam: Understanding the Types of Subject Matters a Practitioner May be Engaged to Report on Using the Trust Services Criteria
ISC CPA Exams: How to Perform Procedures to Test Whether the Entity Responded to Cybersecurity Incidents in Accordance with the Incident Response Plan
ISC CPA Exam: Understanding the Use of Insurance as a Mitigation Strategy for a Security Incident or Data Breach
ISC CPA Exams: How to Perform a Walkthrough of an Organization’s Procedures Related to Confidentiality and Privacy and Compare with Documented Policies
ISC CPA Exam: Detecting Deficiencies in the Operation of Controls in a Service Organization’s Service Commitments and Systems in a SOC 2 Engagement
ISC CPA Exam: Determining Controls and Data Management Practices to Securely Collect, Process, Store, Transmit, and Delete Confidential Data
ISC CPA Exam: Methods for the Protection of Data During the Design, Development, Testing, and Implementation of Applications Using Confidential Data
ISC CPA Exam: How to Detect Deficiencies in the Operation of Controls in an Organization’s Commitments and Requirements in a SOC 2 Engagement
ISC CPA Exam: How to Perform a Walkthrough of an Organization’s Procedures Relevant to IT Security and Compare with the Documented Policies
ISC CPA Exam: How to Provide Input into a Security Assessment Report by Documenting the Issues, Findings, and Recommendations Identified After Performing Test of Controls
ISC CPA Exam: How to Perform Procedures to Understand How the Entity Communicates and Models Security Behaviors Through a Training Program
ISC CPA Exam: How to Determine the Appropriate Authorization Model and the Controls Used to Implement the Model in a Specific Scenario
ISC CPA Exams: Understanding the Appropriate Identification and Authentication Techniques and Technologies in a Specific Scenario
ISC CPA Exam: Understanding the Preventive, Detective, or Corrective Controls to Mitigate Risk of Cyber-Attacks for an Organization
ISC CPA Exam: Understanding the Purpose and Content of a Technology Acceptable Use Policy Including Considerations Specific to Mobile and BYOD Technology
ISC CPA Exam: Understanding the Concepts of Least-Privilege, Zero-Trust, Whitelisting, and the Need-to-Know Principle
ISC CPA Exam: How to Determine the Specific Cybersecurity Threats in an Organization’s Connections with Customers, Vendors, and Partner Organizations
ISC CPA Exam: Understanding the Cybersecurity Risks Related to Using Cloud Environments, Platforms, and Services
ISC CPA Exam: Understanding the Types of Attacks Such as Malware, Social Engineering, Distributed Denial of Service, etc
ISC CPA Exam: How to Classify the Different Types of Threat Agents Such as Internal vs External, or Attacker vs Hacker
ISC CPA Exam: Understanding Governance System Principles, Governance Framework Principles, and the Components of a Governance System According to COBIT 2019
ISC CPA Exam: Understanding the Purpose, Applicability, Target Audience, and Organizational Responsibilities of NIST SP 800-53
ISC CPA Exam: Understanding the Scope of the GDPR and Six Principles and Key Concepts for Personal Data
ISC CPA Exam: Understanding the Covered Entities and Permitted Uses and Disclosures of the HIPAA Security and Privacy Rules
ISC CPA Exam: How to Integrate Data from Different Sources to Provide Information for Financial and Operational Analysis and Decisions
ISC CPA Exam: How to Examine a Relational Database’s Structure to Determine Whether It Applies Data Integrity Rules, Uses a Data Dictionary, and Normalizes the Data
ISC CPA Exam: Understanding Change Management Including Authorization, the Use of Different Environments, Segregation of Duties, Testing, Conversion, and Documentation
ISC CPA Exam: How to Detect Deficiencies in the Operation of Controls Related to an Organization’s Service Commitments and System Requirements in a SOC 2 Engagement
ISC CPA Exam: Understanding the Appropriateness of the Organization’s Data Backup Types Including Recovery Considerations
ISC CPA Exam: Understanding the Measures of System Availability Such as Agreed Service Time and Downtime
FAR CPA Practice Questions Explained: Identifying Appropriate Ratios for a Specified Type of Analysis
ISC CPA Exam: Understanding the Scope, Purpose, and Key Considerations for Business Resiliency, Disaster Recovery, and Business Continuity Plans
ISC CPA Exam: How to Detect Deficiencies in the Operation of Controls Related to an Information System’s Processing Integrity in a SOC 2 Engagement
ISC CPA Exam: How to Reconcile the Actual Sequence of Steps and Information Used in a Key Business Process of an AIS to the Documented Process
ISC CPA Exam: Understanding How Potential Changes to Business Processes Can Improve the Performance of an Accounting Information System
ISC CPA Exam: Understand How the COSO Internal Control Framework is Used in Relation to the Use of Blockchain in Financial Reporting
ISC CPA Exam: Understanding What ERP and Accounting Information Systems Encompass, and How They Interact
ISC CPA Exam: Understanding the Purpose and Recognizing Examples of Key Components of IT Architecture
FAR CPA Practice Questions Explained: Preparing Cash Basis or Modified Cash Basis Financial Statements
BAR CPA Exam: How to Calculate Expenses to be Recognized Under the Accrual Basis of Accounting for Governments and Prepare Journal Entries
BAR CPA Exam: How to Calculate Expenditures to be Recognized Under the Modified Accrual Basis of Accounting for Governments and Prepare Journal Entries
BAR CPA Exam: How to Calculate the Amount of Nonexchange Revenue to be Recognized by Governments Using the Accrual Basis and Prepare Journal Entries