Last Updated on December 13, 2021 by Admin 3

CISA : Certified Information Systems Auditor : Part 64

  1. During an external assessment of network vulnerability, which of the following activities should be performed FIRST?

    • Collect network information
    • Implement an intrusion detection system (IDS)
    • Monitor the network
    • Review policies
  2. Which of the following provides for the GREATEST cost reduction in a large data center?

    • Server consolidation
    • Staff rotation
    • Power conditioning
    • Job-scheduling software
  3. Which of the following would BEST prevent data from being orphaned?

    • Referential integrity
    • Table partitioning
    • Input validation checks
    • Table indexes
  4. What is the PRIMARY reason for hardening new devices before introducing into a corporate network?

    • To comply with organizational rules
    • To ease maintenance of devices
    • To reduce exposure to attacks
    • To avoid software licensing conflicts
  5. Which of the following is the MOST reliable network connection medium in an environment where there is strong electromagnetic interference?

    • Coaxial cable
    • Fiber optic cable
    • Shielded twisted-pair cable
    • Wireless link
  6. When consolidating several applications from two outdated servers onto one new server, which of the following is the GREATEST concern?

    • Increased software licensing cost
    • Maintenance requires more coordination
    • Decreased utilization of capacity
    • Increased network traffic
  7. During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?

    • Identification
    • Data integrity
    • Data validation
    • Authentication
  8. Which of the following is MOST important when an incident may lead to prosecution?

    • Right to perform e-discovery
    • Adherence to incident response procedures
    • Advice from legal counsel
    • Preservation of evidence
  9. An organization is considering replacing physical backup tapes stored offsite with real-time on-line backup to a storage area network (SAN) located in the primary data center. Which of the following is the GREATEST risk?

    • Archived data may not satisfy data retention requirements
    • A single disaster could cause significant data loss
    • Backups may require excessive storage space
    • Implementation could cause significant cost increases
  10. Which of the following is the BEST way to achieve high availability and fault tolerance for an e-business system?

    • Network diversity
    • Storage area network
    • Robust systems architecture
    • Secure offsite backup storage
  11. Which of the following procedures would BEST contribute to the reliability of information in a data warehouse?

    • Retaining only current data
    • Storing only a single type of data
    • Maintaining archive data
    • Maintaining current metadata
  12. Which of the following is the PRIMARY responsibility of an organization’s information security function?

    • Reviewing unauthorized attempts to access sensitive files
    • Managing the organization’s security procedures
    • Approving access to data files
    • Installing network security programs
  13. During the extraction and transfer process of data from an application database to an enterprise data warehouse, some of the fields were not picked up in the extraction process and therefore did not end up in the data warehouse. Which of the following is the GREATEST concern with this situation?

    • Costs associated with correcting the process may exceed budget
    • Transaction errors may occur within the application
    • Management decisions may be based on incorrect data
    • Management reporting could be delayed
  14. Which of the following is the MOST important consideration when investigating a security breach of an e-commerce application?

    • Chain of custody
    • Skill set of the response team
    • Notifications to law enforcement
    • Procedures to analyze evidence
  15. The risk of communication failure in an e-commerce environment is BEST minimized through the use of:

    • alternative or diverse routing
    • compression software to minimize transmission duration
    • a packet filtering firewall to reroute messages
    • functional or message acknowledgments
  16. The operations team of an organization has reported an IS security attack. Which of the following should be the NEXT step for the security incident response team?

    • Document lessons learned.
    • Prioritize resources for corrective action.
    • Perform a damage assessment.
    • Report results to management.
  17. Which of the following could be used to evaluate the effectiveness of IT operations?

    • Total cost of ownership
    • Net present value
    • Balanced scorecard
    • Internal rate of return
  18. The MOST important reason for documenting all aspects of a digital forensic investigation is that documentation:

    • provides traceability for independent investigation by third parties.
    • ensures compliance with corporate incident response policies.
    • ensures the process will be repeatable in future investigations.
    • meets IT audit documentation standards.
  19. What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?

    • Software escrow was not negotiated.
    • An operational level agreement (OLA) was not negotiated.
    • The contract does not contain a right-to-audit clause.
    • Several vendor deliverables missed the commitment date.
  20. When conducting a follow-up audit on an organization’s firewall configuration, the IS auditor discovered that the firewall had been integrated into a new system that provides both firewall and intrusion detection capabilities. The IS auditor should:

    • consider the follow-up audit unnecessary since the firewall is no longer being used.
    • assess whether the integrated system addresses the identified risk.
    • review the compatibility of the new system with existing network controls.
    • evaluate whether current staff is able to support the new system.