ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions

During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?

A.
Key performance indicators (KPIs)
A.
Key performance indicators (KPIs)
Answers
B.
Maximum allowable downtime (MAD)
B.
Maximum allowable downtime (MAD)
Answers
C.
Recovery point objective (RPO)
C.
Recovery point objective (RPO)
Answers
D.
Mean time to restore (MTTR)
D.
Mean time to restore (MTTR)
Answers
Suggested answer: B

Explanation:

The primary factor to determine system criticality within an organization is the maximum allowable downtime (MAD). MAD is the maximum time frame during which recovery must become effective before an outage compromises the ability of an organization to achieve its business objectives and/or survival. MAD reflects the business impact of a system outage on the organization's operations, reputation, compliance, and finances. MAD can help to prioritize system recovery efforts, allocate resources, and establish recovery objectives.

An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:

A.
recommend that the option to directly modify the database be removed immediately.
A.
recommend that the option to directly modify the database be removed immediately.
Answers
B.
recommend that the system require two persons to be involved in modifying the database.
B.
recommend that the system require two persons to be involved in modifying the database.
Answers
C.
determine whether the log of changes to the tables is backed up.
C.
determine whether the log of changes to the tables is backed up.
Answers
D.
determine whether the audit trail is secured and reviewed.
D.
determine whether the audit trail is secured and reviewed.
Answers
Suggested answer: D

Explanation:

The IS auditor's first action after discovering an option in a database that allows the administrator to directly modify any table should be to determine whether the audit trail is secured and reviewed. This is because direct modification of database tables can pose a significant risk to data integrity, security, and accountability. An audit trail is a record of all changes made to database tables, including who made them, when they were made, and what was changed. An audit trail can help to detect unauthorized or erroneous changes, provide evidence for investigations or audits, and support data recovery or restoration. The IS auditor should assess whether the audit trail is protected from tampering or deletion, and whether it is regularly reviewed for anomalies or exceptions.

An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?

A.
Implement a new system that can be patched.
A.
Implement a new system that can be patched.
Answers
B.
Implement additional firewalls to protect the system.
B.
Implement additional firewalls to protect the system.
Answers
C.
Decommission the server.
C.
Decommission the server.
Answers
D.
Evaluate the associated risk.
D.
Evaluate the associated risk.
Answers
Suggested answer: D

Explanation:

The first step in addressing a vulnerability is to evaluate the associated risk, which involves assessing the likelihood and impact of a potential exploit. Based on the risk assessment, the appropriate mitigation strategy can be determined, such as implementing a new system, adding firewalls, or decommissioning the server.Reference:ISACA CISA Review Manual 27th Edition, page 280

IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?

A.
More frequent data backups
A.
More frequent data backups
Answers
B.
Periodic table link checks
B.
Periodic table link checks
Answers
C.
Concurrent access controls
C.
Concurrent access controls
Answers
D.
Performance monitoring tools
D.
Performance monitoring tools
Answers
Suggested answer: B

Explanation:

Referential integrity is a property of data that ensures that all references between tables are valid and consistent. Disabling referential integrity controls can result in orphaned records, data anomalies, and inaccurate queries. The most effective way to compensate for the lack of referential integrity is to perform periodic table link checks, which verify that all foreign keys match existing primary keys in the related tables. More frequent data backups, concurrent access controls, and performance monitoring tools do not address the issue of data consistency and accuracy.Reference:ISACA CISA Review Manual 27th Edition, page 291

A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?

A.
Periodically reviewing log files
A.
Periodically reviewing log files
Answers
B.
Configuring the router as a firewall
B.
Configuring the router as a firewall
Answers
C.
Using smart cards with one-time passwords
C.
Using smart cards with one-time passwords
Answers
D.
Installing biometrics-based authentication
D.
Installing biometrics-based authentication
Answers
Suggested answer: A

Explanation:

The most effective way to detect an intrusion attempt is to periodically review log files, which record the activities and events on a system or network. Log files can provide evidence of unauthorized access attempts, malicious activities, or system errors. Configuring the router as a firewall, using smart cards with one-time passwords, and installing biometrics-based authentication are preventive controls that can reduce the likelihood of an intrusion, but they do not detect it.Reference:ISACA CISA Review Manual 27th Edition, page 301

The PRIMARY advantage of object-oriented technology is enhanced:

A.
efficiency due to the re-use of elements of logic.
A.
efficiency due to the re-use of elements of logic.
Answers
B.
management of sequential program execution for data access.
B.
management of sequential program execution for data access.
Answers
C.
grouping of objects into methods for data access.
C.
grouping of objects into methods for data access.
Answers
D.
management of a restricted variety of data types for a data object.
D.
management of a restricted variety of data types for a data object.
Answers
Suggested answer: A

Explanation:

The primary advantage of object-oriented technology is enhanced efficiency due to the re-use of elements of logic. Object-oriented technology is a software design model that uses objects, which contain both data and code, to create modular and reusable programs. Objects can be inherited from other objects, which reduces duplication and improves maintainability. Grouping objects into methods for data access, managing sequential program execution for data access, and managing a restricted variety of data types for a data object are not advantages of object-oriented technology.Reference:ISACA CISA Review Manual 27th Edition, page 304

From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?

A.
Inability to close unused ports on critical servers
A.
Inability to close unused ports on critical servers
Answers
B.
Inability to identify unused licenses within the organization
B.
Inability to identify unused licenses within the organization
Answers
C.
Inability to deploy updated security patches
C.
Inability to deploy updated security patches
Answers
D.
Inability to determine the cost of deployed software
D.
Inability to determine the cost of deployed software
Answers
Suggested answer: C

Explanation:

The greatest risk associated with an incomplete inventory of deployed software in an organization is the inability to deploy updated security patches. Security patches are updates that fix vulnerabilities or bugs in software that could be exploited by attackers. Without an accurate inventory of software versions and configurations, it is difficult to identify and apply the relevant patches in a timely manner, which exposes the organization to increased security risks. Inability to close unused ports on critical servers, inability to identify unused licenses within the organization, and inability to determine the cost of deployed software are not as critical as security risks.Reference:ISACA CISA Review Manual 27th Edition, page 308

Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?

A.
Configure a single server as a primary authentication server and a second server as a secondary authentication server.
A.
Configure a single server as a primary authentication server and a second server as a secondary authentication server.
Answers
B.
Configure each authentication server as belonging to a cluster of authentication servers.
B.
Configure each authentication server as belonging to a cluster of authentication servers.
Answers
C.
Configure each authentication server and ensure that each disk of its RAID is attached to the primary controller.
C.
Configure each authentication server and ensure that each disk of its RAID is attached to the primary controller.
Answers
D.
Configure each authentication server and ensure that the disks of each server form part of a duplex.
D.
Configure each authentication server and ensure that the disks of each server form part of a duplex.
Answers
Suggested answer: B

Explanation:

Configuring each authentication server as belonging to a cluster of authentication servers is the best way to minimize performance degradation of servers used to authenticate users of an e-commerce website. A cluster is a group of servers that work together to provide high availability, load balancing, and fault tolerance. If one server fails or becomes overloaded, another server in the cluster can take over its workload without disrupting the service. A single server as a primary authentication server and a second server as a secondary authentication server is not as effective as a cluster, because the secondary server is only used when the primary server fails, which means it is idle most of the time and does not improve performance. Configuring each authentication server and ensuring that each disk of its RAID is attached to the primary controller does not address the issue of performance degradation, but rather the issue of data redundancy and reliability. RAID (redundant array of independent disks) is a technology that combines multiple disks into a logical unit that can tolerate disk failures and improve data access speed. Configuring each authentication server and ensuring that the disks of each server form part of a duplex does not address the issue of performance degradation, but rather the issue of data backup and recovery. A duplex is a pair of disks that store identical copies of data, so that if one disk fails, the other disk can be used to restore the data.Reference:ISACA CISA Review Manual 27th Edition, page 310

During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:

A.
allocation of resources during an emergency.
A.
allocation of resources during an emergency.
Answers
B.
frequency of system testing.
B.
frequency of system testing.
Answers
C.
differences in IS policies and procedures.
C.
differences in IS policies and procedures.
Answers
D.
maintenance of hardware and software compatibility.
D.
maintenance of hardware and software compatibility.
Answers
Suggested answer: A

Explanation:

During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be most concerned with the allocation of resources during an emergency. A reciprocal disaster recovery agreement is an arrangement by which one organization agrees to use another's resources in the event of a business continuity event or incident. The IS auditor would need to ensure that both parties have clearly defined their roles and responsibilities, their resource requirements, their priority levels, their communication channels, and their escalation procedures in case of a disaster. The IS auditor would also need to verify that both parties have tested their agreement and have updated it regularly to reflect any changes in their business environments. The frequency of system testing is not as critical as the allocation of resources during an emergency, because system testing can be performed periodically or on demand, while resource allocation is a dynamic and complex process that requires careful planning and coordination. The differences in IS policies and procedures are not as critical as the allocation of resources during an emergency, because both parties can agree on common standards and protocols for their disaster recovery operations, or they can adapt their policies and procedures to suit each other's needs. The maintenance of hardware and software compatibility is not as critical as the allocation of resources during an emergency, because both parties can use compatible or interoperable systems, or they can use virtualization or cloud computing technologies to overcome any compatibility issues.Reference:ISACA CISA Review Manual 27th Edition, page 281

Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?

A.
Phishing
A.
Phishing
Answers
B.
Using a dictionary attack of encrypted passwords
B.
Using a dictionary attack of encrypted passwords
Answers
C.
Intercepting packets and viewing passwords
C.
Intercepting packets and viewing passwords
Answers
D.
Flooding the site with an excessive number of packets
D.
Flooding the site with an excessive number of packets
Answers
Suggested answer: D

Explanation:

Flooding the site with an excessive number of packets is an attack technique that will succeed because of an inherent security weakness in an Internet firewall. This type of attack is also known as a denial-of-service (DoS) attack or a distributed denial-of-service (DDoS) attack if it involves multiple sources. The aim of this attack is to overwhelm the network bandwidth or the processing capacity of the firewall or the target system, rendering it unable to respond to legitimate requests or perform its normal functions. An Internet firewall is a device or software that monitors and controls incoming and outgoing network traffic based on predefined rules. A firewall can block or allow traffic based on various criteria, such as source address, destination address, port number, protocol type, application type, etc. However, a firewall cannot prevent traffic from reaching its interface or distinguish between legitimate and malicious traffic based on its content or behavior. Therefore, a firewall is vulnerable to flooding attacks that exploit its limited resources. Phishing is an attack technique that involves sending fraudulent emails or messages that appear to come from legitimate sources, such as banks, government agencies, online services, etc., in order to trick recipients into revealing their personal or financial information, such as passwords, credit card numbers, bank account details, etc., or into clicking on malicious links or attachments that can infect their systems with malware or ransomware. Phishing does not exploit an inherent security weakness in an Internet firewall, but rather exploits human psychology and social engineering techniques. A firewall cannot prevent phishing emails or messages from reaching their intended targets, unless they contain some identifiable features that can be filtered out by the firewall rules. However, a firewall cannot detect or prevent users from responding to phishing emails or messages or from opening malicious links or attachments. Using a dictionary attack of encrypted passwords is an attack technique that involves trying to guess or crack passwords by using a list of common or likely passwords or by using a brute-force method that tries all possible combinations of characters. This type of attack does not exploit an inherent security weakness in an Internet firewall, but rather exploits weak or poorly chosen passwords or weak encryption algorithms. A firewall cannot prevent a dictionary attack of encrypted passwords, unless it has some mechanisms to detect and block repeated or suspicious login attempts or to enforce strong password policies. However, a firewall cannot protect passwords from being stolen or intercepted by other means, such as phishing, malware, keylogging, etc. Intercepting packets and viewing passwords is an attack technique that involves capturing and analyzing network traffic that contains sensitive information, such as passwords, credit card numbers, bank account details, etc., in order to use them for malicious purposes. This type of attack does not exploit an inherent security weakness in an Internet firewall, but rather exploits insecure or unencrypted network communication protocols or channels. A firewall cannot prevent packets from being intercepted and viewed by unauthorized parties, unless it has some mechanisms to encrypt or obfuscate the network traffic or to authenticate the source and destination of the traffic. However, a firewall cannot protect packets from being modified or tampered with by other means, such as man-in-the-middle attacks, replay attacks, etc.Reference:ISACA CISA Review Manual 27th Edition, page 300

Total 1.198 questions
Go to page: of 120