ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 55

Question list
Search
Search

Related questions











An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?

A.
A significant increase in authorized connections to third parties
A.
A significant increase in authorized connections to third parties
Answers
B.
A significant increase in cybersecurity audit findings
B.
A significant increase in cybersecurity audit findings
Answers
C.
A significant increase in approved exceptions
C.
A significant increase in approved exceptions
Answers
D.
A significant increase in external attack attempts
D.
A significant increase in external attack attempts
Answers
Suggested answer: C

Explanation:

The greatest indicator that the cybersecurity policy may need to be revised is a significant increase in approved exceptions. This implies that the policy is not aligned with the current business needs and risks, and that it may be too restrictive or outdated.The other options are not necessarily indicators of a need for policy revision, as they may be due to other factors such as changes in the external environment, audit scope or methodology.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.21

The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?

A.
Report results to management
A.
Report results to management
Answers
B.
Document lessons learned
B.
Document lessons learned
Answers
C.
Perform a damage assessment
C.
Perform a damage assessment
Answers
D.
Prioritize resources for corrective action
D.
Prioritize resources for corrective action
Answers
Suggested answer: C

Explanation:

The first step for the security incident response team after an IS security attack is reported is to perform a damage assessment. This involves identifying the scope, impact and root cause of the incident, as well as collecting and preserving evidence for further analysis and investigation.Reporting results to management, documenting lessons learned and prioritizing resources for corrective action are important steps, but they should be done after the damage assessment is completed.Reference:CISA Review Manual (Digital Version), Chapter 6, Section 6.31

An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?

A.
Intrusion detection system (IDS)
A.
Intrusion detection system (IDS)
Answers
B.
Security information and event management (SIEM) system
B.
Security information and event management (SIEM) system
Answers
C.
Stateful firewall
C.
Stateful firewall
Answers
D.
Load balancer
D.
Load balancer
Answers
Suggested answer: C

Explanation:

A stateful firewall provides the greatest assurance that outgoing Internet traffic is controlled, as it monitors and filters packets based on their source, destination and connection state. A stateful firewall can prevent unauthorized or malicious traffic from leaving the network, as well as block incoming traffic that does not match an established connection. An intrusion detection system (IDS) can detect and alert on suspicious or anomalous traffic, but it does not block or control it. A security information and event management (SIEM) system can collect and analyze logs and events from various sources, but it does not directly control traffic.A load balancer can distribute traffic among multiple servers, but it does not filter or monitor it.Reference:CISA Review Manual (Digital Version), Chapter 6, Section 6.2

Backup procedures for an organization's critical data are considered to be which type of control?

A.
Directive
A.
Directive
Answers
B.
Corrective
B.
Corrective
Answers
C.
Detective
C.
Detective
Answers
D.
Compensating
D.
Compensating
Answers
Suggested answer: B

Explanation:

Backup procedures for an organization's critical data are considered to be corrective controls, as they are designed to restore normal operations after a disruption or failure. Corrective controls aim to minimize the impact of an incident and prevent recurrence. Directive, detective and compensating controls are not related to backup procedures. Directive controls are intended to guide or instruct users to follow policies and procedures. Detective controls are intended to identify and report incidents or violations.Compensating controls are intended to mitigate the risk of a missing or ineffective primary control.Reference:CISA Review Manual (Digital Version), Chapter 2, Section 2.11

What is the PRIMARY benefit of using one-time passwords?

A.
An intercepted password cannot be reused
A.
An intercepted password cannot be reused
Answers
B.
Security for applications can be automated
B.
Security for applications can be automated
Answers
C.
Users do not have to memorize complex passwords
C.
Users do not have to memorize complex passwords
Answers
D.
Users cannot be locked out of an account
D.
Users cannot be locked out of an account
Answers
Suggested answer: A

Explanation:

The primary benefit of using one-time passwords is that an intercepted password cannot be reused, as it is valid only for a single login session or transaction. One-time passwords enhance the security of authentication by preventing replay attacks or password guessing. The other options are not the primary benefits of using one-time passwords. Security for applications can be automated with or without one-time passwords. Users may still have to memorize complex passwords or use a device or software to generate one-time passwords.Users can still be locked out of an account if they enter an incorrect or expired one-time password.Reference:CISA Review Manual (Digital Version), Chapter 6, Section 6.1

Which of the following should an organization do to anticipate the effects of a disaster?

A.
Define recovery point objectives (RPO)
A.
Define recovery point objectives (RPO)
Answers
B.
Simulate a disaster recovery
B.
Simulate a disaster recovery
Answers
C.
Develop a business impact analysis (BIA)
C.
Develop a business impact analysis (BIA)
Answers
D.
Analyze capability maturity model gaps
D.
Analyze capability maturity model gaps
Answers
Suggested answer: C

Explanation:

A business impact analysis (BIA) is the process of identifying and assessing the potential impacts a disruption or incident could have on an organization. A BIA helps organizations understand and prepare for these potential obstacles, so they can act quickly and face challenges head-on when they arise. A BIA tells the organization what to expect when unforeseen roadblocks occur, so they can make a plan to get their business back on track as quickly as possible. Therefore, a BIA is the best option to anticipate the effects of a disaster.

10: Business Impact Analysis (BIA): Prepare for Anything [2023] * Asana

11: Definition of Business Impact Analysis (BIA) - IT Glossary | Gartner Information Technology

12: Business impact analysis (BIA) is a method to predict the consequences of disruptions to a business, its processes and systems by collecting relevant data.

Afire alarm system has been installed in the computer room The MOST effective location for the fire alarm control panel would be inside the

A.
computer room closest to the uninterruptible power supply (UPS) module
A.
computer room closest to the uninterruptible power supply (UPS) module
Answers
B.
computer room closest to the server computers
B.
computer room closest to the server computers
Answers
C.
system administrators' office
C.
system administrators' office
Answers
D.
booth used by the building security personnel
D.
booth used by the building security personnel
Answers
Suggested answer: D

Explanation:

A fire alarm system is a device that detects and alerts people of the presence of fire or smoke in a building. A fire alarm control panel is the central unit that monitors and controls the fire alarm system. The most effective location for the fire alarm control panel would be inside the booth used by the building security personnel. This is because:

The security personnel can quickly and easily access the fire alarm control panel in case of an emergency, and take appropriate actions such as notifying the fire department, evacuating the building, or resetting the system.

The fire alarm control panel can be protected from unauthorized access, tampering, or damage by the security personnel, who can also monitor its status and performance regularly.

The fire alarm control panel can be isolated from the computer room, which may be exposed to higher risks of fire or smoke due to the presence of electrical equipment, such as uninterruptible power supply (UPS) modules or server computers.

The fire alarm control panel can be connected to the computer room through a dedicated communication line, which can ensure reliable and timely transmission of signals and information between the two locations.

[1]: Fire Alarm Control Panel - an overview | ScienceDirect Topics

[2]: Fire Alarm Control Panel - What is it and how does it work? | Fire Protection Online

[3]: Fire Alarm Control Panel Installation Guide - XLS3000 - Honeywell

Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?

A.
Monitoring tools are configured to alert in case of downtime
A.
Monitoring tools are configured to alert in case of downtime
Answers
B.
A comprehensive security review is performed every quarter.
B.
A comprehensive security review is performed every quarter.
Answers
C.
Data for different tenants is segregated by database schema
C.
Data for different tenants is segregated by database schema
Answers
D.
Tenants are required to implement data classification polices
D.
Tenants are required to implement data classification polices
Answers
Suggested answer: D

Explanation:

Data leakage prevention (DLP) is the process of preventing unauthorized access, disclosure, or transfer of sensitive data. In a multi-tenant cloud environment, where multiple customers share the same infrastructure and resources, DLP is a critical challenge. One of the best methods to enforce DLP in such an environment is to require tenants to implement data classification policies. Data classification policies define the types and levels of sensitivity of data, and the corresponding security controls and measures to protect them. By implementing data classification policies, tenants can ensure that their data is properly labeled, encrypted, segregated, and monitored according to their specific requirements and compliance standards. This can help prevent data leakage from accidental or malicious actions by other tenants, cloud service providers, or external parties.

2: How Do I Secure my Data in a Multi-Tenant Cloud Environment? | Thales

3: Protecting Sensitive Customer Data in a Cloud-Based Multi-Tenant Environment | Saturn Cloud

4: Microsoft 365 isolation controls - Microsoft Service Assurance

Which of the following is the BEST way to minimize sampling risk?

A.
Use a larger sample size
A.
Use a larger sample size
Answers
B.
Perform statistical sampling
B.
Perform statistical sampling
Answers
C.
Perform judgmental sampling
C.
Perform judgmental sampling
Answers
D.
Enhance audit testing procedures
D.
Enhance audit testing procedures
Answers
Suggested answer: B

Explanation:

Sampling risk is the risk that the auditor's conclusion based on a sample may be different from the conclusion that would be reached if the entire population was tested using the same audit procedure. Sampling risk can lead to either incorrect rejection or incorrect acceptance of the audit objective. The best way to minimize sampling risk is to perform statistical sampling. Statistical sampling is a method of selecting and evaluating a sample using probability theory and mathematical calculations. Statistical sampling allows auditors to measure and control the sampling risk by determining the appropriate sample size and selection method, and evaluating the results using confidence levels and precision intervals. Statistical sampling can also provide more objective and consistent results than judgmental sampling, which relies on the auditor's professional judgment and experience.

6: Sampling Risks: Definition, Example, and Explanation - Wikiaccounting

7: Sampling Risk in Audit | Sampling vs non sampling risk - Accountinguide

9: Audit sampling | ACCA Qualification | Students | ACCA Global

An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?

A.
Security procedures may be inadequate to support the change
A.
Security procedures may be inadequate to support the change
Answers
B.
A distributed security system is inherently a weak security system
B.
A distributed security system is inherently a weak security system
Answers
C.
End-user acceptance of the new system may be difficult to obtain
C.
End-user acceptance of the new system may be difficult to obtain
Answers
D.
The new system will require additional resources
D.
The new system will require additional resources
Answers
Suggested answer: A

Explanation:

A distributed security administration system is a system that allows different administrators to manage the security of different parts of the network or organization. This can provide more flexibility, scalability, and efficiency than a centralized system, where one administrator is responsible for the entire security. However, a distributed security administration system also presents some potential challenges and risks, such as:

Inconsistency and conflict among different security policies and standards

Lack of coordination and communication among different administrators

Difficulty in monitoring and auditing the overall security status and performance

Increased complexity and cost of security management and maintenance

Therefore, the greatest potential concern for implementing a distributed security administration system is that the security procedures may be inadequate to support the change. Security procedures are the rules and guidelines that define how security is implemented and enforced in an organization. They include policies, standards, processes, roles, responsibilities, controls, and metrics. Security procedures should be aligned with the business objectives, risks, and requirements of the organization, as well as the best practices and regulations in the industry. Security procedures should also be reviewed and updated regularly to reflect the changes in the environment, technology, and threats.

If the security procedures are not adequate to support the change from a centralized to a distributed security administration system, the organization may face increased security risks, such as unauthorized access, data breaches, compliance violations, reputation damage, and financial losses. Therefore, it is essential to ensure that the security procedures are revised and adapted to suit the new system, and that they are communicated and enforced effectively across the organization.

1: Security in Distributed System - GeeksforGeeks

2: Distributed System Security Architecture - Wikipedia

3: Distributed Systems Security: Issues, Processes and Solutions

Total 1.198 questions
Go to page: of 120