Last Updated on December 13, 2021 by Admin 3

 CISA : Certified Information Systems Auditor : Part 126

  1. What is a common vulnerability, allowing denial-of-service attacks?

    • Assigning access to users according to the principle of least privilege
    • Lack of employee awareness of organizational security policies
    • Improperly configured routers and router access lists
    • Configuring firewall access rules

    Explanation: 
    Improperly configured routers and router access lists are a common vulnerability for denial-of- service attacks.

  2. What are trojan horse programs?

    • A common form of internal attack
    • Malicious programs that require the aid of a carrier program such as email
    • Malicious programs that can run independently and can propagate without the aid of a carrier program such as email
    • A common form of Internet attack
    Explanation: 
    Trojan horse programs are a common form of Internet attack.
  3. What is/are used to measure and ensure proper network capacity management and availability of services?

    • Network performance-monitoring tools
    • Network component redundancy
    • Syslog reporting
    • IT strategic planning
    Explanation: 
    Network performance-monitoring tools are used to measure and ensure proper network capacity management and availability of services.
  4. What can be used to gather evidence of network attacks?

    • Access control lists (ACL)
    • Intrusion-detection systems (IDS)
    • Syslog reporting
    • Antivirus programs
    Explanation: 
    Intrusion-detection systems (IDS) are used to gather evidence of network attacks.
  5. Which of the following is a passive attack method used by intruders to determine potential network vulnerabilities?

    • Traffic analysis
    • SYN flood
    • Denial of service (DoS)
    • Distributed denial of service (DoS)
    Explanation: 
    Traffic analysis is a passive attack method used by intruders to determine potential network vulnerabilities. All others are active attacks.
  6. Which of the following fire-suppression methods is considered to be the most environmentally friendly?

    • Halon gas
    • Deluge sprinklers
    • Dry-pipe sprinklers
    • Wet-pipe sprinklers
    Explanation: 
    Although many methods of fire suppression exist, dry-pipe sprinklers are considered to be the most environmentally friendly.
  7. What is a callback system?

    • It is a remote-access system whereby the remote-access server immediately calls the user back at a predetermined number if the dial-in connection fails.
    • It is a remote-access system whereby the user’s application automatically redials the remote access server if the initial connection attempt fails.
    • It is a remote-access control whereby the user initially connects to the network systems via dial-up access, only to have the initial connection terminated by the server, which then subsequently dials the user back at a predetermined number stored in the server’s configuration database.
    • It is a remote-access control whereby the user initially connects to the network systems via dial-up access, only to have the initial connection terminated by the server, which then subsequently allows the user to call back at an approved number for a limited period of time.
    Explanation: 
    A callback system is a remote-access control whereby the user initially connects to the network systems via dial-up access, only to have the initial connection terminated by the server, which then subsequently dials the user back at a predetermined number stored in the server’s configuration database.
  8. What type of fire-suppression system suppresses fire via water that is released from a main valve to be delivered via a system of dry pipes installed throughout the facilities?

    • A dry-pipe sprinkler system
    • A deluge sprinkler system
    • A wet-pipe system
    • A halon sprinkler system
    Explanation: 
    A dry-pipe sprinkler system suppresses fire via water that is released from a main valve to be delivered via a system of dry pipes installed throughout the facilities.
  9. Digital signatures require the sender to “sign” the data by encrypting the data with the sender’s public key, to then be decrypted by the recipient using the recipient’s private key.

    True or false?

    • False
    • True
    Explanation: 
    Digital signatures require the sender to “sign” the data by encrypting the data with the sender’s public key, to then be decrypted by the recipient using the sender’s public key.
  10. Which of the following provides the BEST single-factor authentication?

    • Biometrics
    • Password
    • Token
    • PIN
    Explanation: 
    Although biometrics provides only single-factor authentication, many consider it to be an excellent method for user authentication.
  11. What is used to provide authentication of the website and can also be used to successfully authenticate keys used for data encryption?

    • An organizational certificate
    • A user certificate
    • A website certificate
    • Authenticode
    Explanation: 
    A website certificate is used to provide authentication of the website and can also be used to successfully authenticate keys used for data encryption.
  12. What determines the strength of a secret key within a symmetric key cryptosystem?

    • A combination of key length, degree of permutation, and the complexity of the data- encryption algorithm that uses the key
    • A combination of key length, initial input vectors, and the complexity of the data- encryption algorithm that uses the key
    • A combination of key length and the complexity of the data-encryption algorithm that uses the key
    • Initial input vectors and the complexity of the data-encryption algorithm that uses the key
    Explanation: 
    The strength of a secret key within a symmetric key cryptosystem is determined by a combination of key length, initial input vectors, and the complexity of the data-encryption algorithm that uses the key.
  13. What process is used to validate a subject’s identity?

    • Identification
    • Nonrepudiation
    • Authorization
    • Authentication
    Explanation: 
    Authentication is used to validate a subject’s identity.
  14. What is often assured through table link verification and reference checks?

    • Database integrity
    • Database synchronization
    • Database normalcy
    • Database accuracy
    Explanation: 
    Database integrity is most often ensured through table link verification and reference checks.
  15. Which of the following should an IS auditor review to determine user permissions that have been granted for a particular resource?

    • Systems logs
    • Access control lists (ACL)
    • Application logs
    • Error logs
    Explanation: 
    IS auditors should review access-control lists (ACL) to determine user permissions that have been granted for a particular resource.
  16. What should IS auditors always check when auditing password files?

    • That deleting password files is protected
    • That password files are encrypted
    • That password files are not accessible over the network
    • That password files are archived
    Explanation: 
    IS auditors should always check to ensure that password files are encrypted.
  17. Using the OSI reference model, what layer(s) is/are used to encrypt data?

    • transport layer
    • Session layer
    • Session and transport layers
    • Data link layer
    Explanation: 
    User applications often encrypt and encapsulate data using protocols within the OSI session layer or farther down in the transport layer.
  18. When should systems administrators first assess the impact of applications or systems patches?

    • Within five business days following installation
    • Prior to installation
    • No sooner than five business days following installation
    • Immediately following installation
    Explanation: 
    Systems administrators should always assess the impact of patches before installation.
  19. Which of the following is the most fundamental step in preventing virus attacks?

    • Adopting and communicating a comprehensive antivirus policy
    • Implementing antivirus protection software on users’ desktop computers
    • Implementing antivirus content checking at all network-to-Internet gateways
    • Inoculating systems with antivirus code
    Explanation: 
    Adopting and communicating a comprehensive antivirus policy is the most fundamental step in preventing virus attacks. All other antivirus prevention efforts rely upon decisions established and communicated via policy.
  20. Which of the following is of greatest concern when performing an IS audit?

    • Users’ ability to directly modify the database
    • Users’ ability to submit queries to the database
    • Users’ ability to indirectly modify the database
    • Users’ ability to directly view the database
    Explanation: 
    A major IS audit concern is users’ ability to directly modify the database.