ExamGecko
Question list
Search
Search

Related questions











Question 517 - CISA discussion

Report
Export

Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?

A.
Analyzing how the configuration changes are performed
Answers
A.
Analyzing how the configuration changes are performed
B.
Analyzing log files
Answers
B.
Analyzing log files
C.
Reviewing the rule base
Answers
C.
Reviewing the rule base
D.
Performing penetration testing
Answers
D.
Performing penetration testing
Suggested answer: C

Explanation:

The best audit evidence that a firewall is configured in compliance with the organization's security policy is to review the rule base. The rule base is a set of rules that defines the criteria for allowing or denying network traffic through the firewall. By reviewing the rule base, the auditor can verify if the firewall configuration matches the security policy requirements and objectives.Analyzing how the configuration changes are performed, analyzing log files, and performing penetration testing are useful audit techniques, but they do not provide direct evidence of the firewall configuration compliance.Reference:CISA Review Manual (Digital Version)1, page 383.

asked 18/09/2024
Hector Quintero
47 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first