ExamGecko
Question list
Search
Search

Related questions

Question 203 - CISA discussion

Report
Export

Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?

A.
Reviewing the parameter settings
Answers
A.
Reviewing the parameter settings
B.
Reviewing the system log
Answers
B.
Reviewing the system log
C.
Interviewing the firewall administrator
Answers
C.
Interviewing the firewall administrator
D.
Reviewing the actual procedures
Answers
D.
Reviewing the actual procedures
Suggested answer: A

Explanation:

The best audit procedure to determine whether a firewall is configured in compliance with the organization's security policy is reviewing the parameter settings. Parameter settings are values or options that define how a firewall operates and functions, such as rules, filters, ports, protocols, etc. By reviewing the parameter settings of a firewall, an IS auditor can verify whether they match with the organization's security policy, which is a document that outlines the security objectives, requirements, and guidelines for an organization's information systems and resources. Reviewing the system log is a possible audit procedure to determine whether a firewall is configured in compliance with the organization's security policy, but it is not the best one, as a system log records events or activities that occur on a firewall, such as connections, requests, responses, errors, alerts, etc., and may not indicate whether they comply with the organization's security policy. Interviewing the firewall administrator is a possible audit procedure to determine whether a firewall is configured in compliance with the organization's security policy, but it is not the best one, as a firewall administrator may not provide accurate or reliable information about the firewall configuration, and may have conflicts of interest or ulterior motives. Reviewing the actual procedures is a possible audit procedure to determine whether a firewall is configured in compliance with the organization's security policy, but it is not the best one, as actual procedures describe how a firewall is configured and maintained, such as installation, testing, updating, etc., and may not reflect whether they comply with the organization's security policy.

asked 18/09/2024
Roger Warner
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first