Last Updated on December 13, 2021 by Admin 3

 CISA : Certified Information Systems Auditor : Part 166

  1. Which of the following processes would benefit MOST from vulnerability scan results?

    • Traffic management
    • Patch management
    • Asset management
    • Incident management
  2. The use of cookies constitutes the MOST significant security threat when they are used for:

    • authenticating using username and password.
    • downloading files from the host server.
    • obtaining a public key from a certification authority (CA).
    • forwarding email and Internet protocol (IP) addresses.
  3. Which of the following is the BEST control to help prevent sensitive data leaving an organization via email?

    • Scanning outgoing emails
    • Providing encryption solutions for employees
    • Conducting periodic phishing tests
    • Blocking outbound emails sent without encryption
  4. A manager identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor in this scenario?

    • Hacktivists
    • Deleted log data
    • Terminated staff
    • Unauthorized access
  5. Which of the following BEST help to ensure system resiliency for a business application that processes high-volume and real-time retail transactions?

    • Adequate resourcing for the incident response team
    • Adequate encryption between applications
    • Adequate application clustering
    • Adequate reciprocal recovery agreement
  6. The PRIMARY purpose of conducting a test of an alternate site as part of a disaster recovery program is to:

    • assess security awareness among employees.
    • determine recovery time objectives (RTOs).
    • verify the alternate infrastructure works as designed.
    • identify hidden costs for maintaining the site.
  7. Which of the following is the BEST method to secure credit card information displayed by an application used by both customer service representatives and fraud analysts?

    • Truncation
    • One-way hash
    • Encryption
    • Masking
  8. Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?

    • Temperature sensors
    • Air pressure sensors
    • Humidity sensors
    • Water sensors
  9. An IS auditor is evaluating the risk of zero-day attacks and related mitigating controls for an organization. The auditor’s BEST recommendation is to implement:

    • a demilitarized zone (DMZ).
    • a signature-based antivirus program.
    • a heuristic intrusion prevention system (IPS).
    • an intrusion detection system (IDS).
  10. What is the MOST important consideration of any disaster response plan?

    • Personnel safety
    • Business resumption
    • Adequate resource capacity
    • IT asset protection
  11. The practice of performing backups reflects which type of internal control?

    • Corrective
    • Preventive
    • Detective
    • Compensating
  12. Which of the following user actions constitutes the GREATEST risk for introducing viruses into a local network?

    • Downloading a file from an external server
    • Uploading a file onto an internal server
    • Opening an email attachment
    • Viewing a hypertext markup language (HTML) document
  13. An organization is evaluating a disaster recovery testing scenario in which a ransomware attack occurs and the business impact analysis (BIA) indicates the recovery point objective (RPO) is 6 hours. Which of the following BEST ensures the most recent good data set will be available after the attack occurs?

    • Replication occurs every 15 minutes.
    • Backup is configured every 5 hours.
    • Replication is every 6 hours.
    • Backup is configured every 4 hours.
  14. Which of the following is a benefit of using symmetric cryptography instead of asymmetric cryptography?

    • Can be used for digital signature
    • Efficiency of use
    • Enhanced authentication
    • Improved key management
  15. An external attacker spoofing an internal protocol (IP) address can BEST be detected by which of the following?

    • Using a state table to compare the message states of each packet as it enters the system
    • Comparing the source address to the interface used as the entry point
    • Using static IP addresses for identification
    • Comparing the source address to the domain name server entry
  16. During an IT operations audit, multiple unencrypted backup tapes containing sensitive credit card information cannot be found. Which of the following presents the GREATEST risk to the organization?

    • Reputational damage due to potential identity theft
    • The cost of recreating the missing backup tapes
    • Business disruption if a data restore cannot be completed
    • Human resource cost of responding to the incident
  17. Tunneling provides additional security for connecting one host to another through the Internet by:

    • enabling the use of stronger encryption keys.
    • facilitating the exchange of public key infrastructure (PKI) certificates.
    • providing end-to-end encryption.
    • preventing password cracking and replay attacks.
  18. An organization performs both full and incremental database backups. Which of the following will BEST enable full restoration in the event of the destruction of the data center?

    • Rotate all backups to an offsite location daily.
    • Transmit incremental backups to an offsite location daily.
    • Move full backups to an offsite location weekly.
    • Maintain full and incremental backups in a secure server room.
  19. A new privacy regulation requires a customer’s privacy information to be deleted within 72 hours, if requested. Which of the following would be an IS auditor’s GREATEST concern regarding compliance to this regulation?

    • Lack of knowledge of where customers’ information is saved
    • Outdated online privacy policies
    • Incomplete backup and retention policies
    • End user access to applications with customer information
  20. Which of the following clauses is MOST important to include in a contract to help maintain data privacy in the event a Platform as a Service (PaaS) provider becomes financially insolvent?

    • Secure data destruction
    • Intellectual property protection
    • Data classification
    • Software escrow