CISA : Certified Information Systems Auditor : Part 165
-
Which of the following would BEST protect a network from a worm that exploits a publicly announced operating system vulnerability?
- Antivirus software
- User awareness and training
- Host security
- Patch management
-
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
- Monitor access to stored images and snapshots of virtual machines
- Restrict access to images and snapshots of virtual machines
- Review logical access controls on virtual machines regularly
- Limit creation of virtual machine images and snapshots
-
What is the MAIN objective when implementing security controls within an application?
- To minimize reputational risk to the organization
- To minimize the exposure to the fullest extent possible
- To optimize the level of data protection achieved against cost
- To optimize user functionality of the application
-
Which of the following controls would BEST help to protect an organization from social engineering attacks?
- Email monitoring
- Social media access restrictions
- Security awareness training
- Firewall access control list reviews
-
What is the PRIMARY reason for including a clause requiring source code escrow in an application vendor agreement?
- Protect the organization from copyright disputes.
- Ensure source code changes are recorded.
- Segregate system development and live environments.
- Ensure the source code remains available.
-
Which of the following would provide the BEST evidence of the adequacy of firewall rules?
- Performing penetration tests
- Reviewing intrusion detection system (IDS) logs
- Reviewing network logs
- Verifying firewall configuration
-
Which of the following is the BEST control to reduce the likelihood that a spear phishing attack will be successful?
- Tools for users to report suspicious emails and unusual financial transactions
- Spam filtering for emails containing external hyperlinks sent to mass recipient lists
- Automated alerts to security managers identifying confidential information transferred externally
- Education for staff and high-profile users on social engineering
-
Which of the following would BEST help management maintain a current and effective business continuity plan (BCP)?
- Update the critical business software list on an annual basis.
- Perform a periodic recovery test and include a lessons-learned summary.
- Perform an annual walk-through and verify resources at the recovery site.
- Verify vendor restore requirements are consistent with the recovery plan.
-
An IS auditor is reviewing environmental controls and finds extremely high levels of humidity in the data center. Which of the following is the PRIMARY risk to computer equipment from this condition?
- Brownout
- Fire
- Static electricity
- Corrosion
-
Which of the following is the BEST way to minimize the impact of a ransomware attack?
- Grant system access based on least privilege.
- Provide user awareness training on ransomware attacks.
- Perform more frequent system backups.
- Maintain a regular schedule for patch updates.
-
What is the BEST type of network topology to reduce the risk of network faults?
- Bus network
- Star network
- Ring network
- Mesh network
-
An organization’s sensitive data is stored in a cloud computing environment and is encrypted. Which of the following findings should be of GREATEST concern to an IS auditor?
- Symmetric keys are used for encryption.
- Encryption keys are not rotated on a regular basis.
- Test data encryption keys are being used in production.
- Data encryption keys are accessible to the service provider.
-
Which of the following is the MOST important metric in selecting a biometric device?
- System response time
- Crossover error rate
- False rejection rate
- Image size
-
An IS auditor observes that a bank’s web page address is prefixed “https://”. The auditor would be correct to conclude that:
- the bank has a restricted Internet protocol (IP) address.
- the bank has established a virtual private network (VPN).
- the customer is connected to the bank’s intranet.
- transactions are encrypted.
-
When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?
- Data backups
- Decision support system
- Operating system
- Applications
-
Which of the following findings would be of GREATEST concern when reviewing a business impact analysis (BIA)?
- There is not adequate documentation to perform a recovery.
- The business continuity plan (BCP) does not align with corporate strategy.
- Several key business processes were not included.
- The recovery point objective (RPO) is not accurate.
-
Which of the following would BEST detect unauthorized modification of data by a database administrator (DBA)?
- Audit database change requests
- Audit database activity logs
- Review changes to edit checks
- Compare data to input records
-
Which of the following attacks would MOST likely result in the interception and modification of traffic for mobile phones connecting to potentially insecure public Wi-Fi networks?
- Phishing
- Man-in-the middle
- Vishing
- Brute force
-
An IS auditor is reviewing a small organization’s business continuity and disaster recovery plans. Which of the following findings would pose the GREATEST concern?
- Data backup and storage is not performed every day.
- Practice drills related to the plans are conducted infrequently.
- The plans are not periodically reviewed and updated.
- The organization’s hardware is near end-of-life.
-
Which of the following is the BEST method to delete sensitive information from storage media that will be reused?
- Multiple-overwriting
- Crypto-shredding
- Reformatting
- Re-partitioning
Subscribe
0 Comments
Newest