05.2 - 2020 - CISA-50Q - Additional - Questions - v1
05.2 - 2020 - CISA-50Q - Additional - Questions - v1
152. To ensure authentication, confidentiality and integrity of a message, the sender should encrypt
the hash of the message with the sender's:
A. public key and then encrypt the message with the receiver's private key.
B. private key and then encrypt the message with the receiver's public key.
C. public key and then encrypt the message with the receiver's public key.
D. private key and then encrypt the message with the receiver's private key.
153. Which of the following should be a concern to an IS auditor reviewing a wireless network?
A. 128-bit static-key WEP (Wired Equivalent Privacy) encryption is enabled.
B. SSID (Service Set Identifier) broadcasting has been enabled.
C. Antivirus software has been installed in all wireless clients.
D. MAC (Media Access Control) access control filtering has been deployed.
154. An IS auditor observes a weakness in the tape management system at a data center in that
some parameters are set to bypass or ignore tape header records. Which of the following is the
MOST effective compensating control for this weakness?
A. Staging and job set up
B. Supervisory review of logs
C. Regular back up of tapes
D. Of fsite storage of tapes
155. Which of the following is the BEST audit procedure to determine if a firewall is configured i n
compliance with an organization's security policy?
A. Review the parameter settings.
B. Interview the f irewall administrator.
C. Review the actual procedures.
D. Review the device's log file for recent attacks.
158. What is the MOST prevalent security risk when an organization implements remote virtual
private network (VPN) access to its network?
A. Malicious code could be spread across the network
B. VPN logon could be spoofed
C. Traf f ic could be sniffed and decrypted
D. VPN gateway could be compromised
159. The activation of an enterprise's business continuity plan should be based on predetermined
criteria that address the:
A. duration of the outage.
B. type of outage.
C. probability of the outage.
D. cause of the outage.
160. An organization with extremely high security requirements is evaluating the effectiveness of
biometric systems. Which of the following performance indicators is MOST important?
A. False-acceptance rate (FAR)
B. Equal-error rate (EER)
C. False-rejection rate (FRR)
D. False-identification rate (FIR)
162. To minimize costs and improve service levels an outsourcer should seek which of the
following contract clauses?
A. O/S and hardware refresh frequencies
B. Gain-sharing performance bonuses
C. Penalties for noncompliance
D. Charges tied to variable cost metrics
164. Many IT projects experience problems because the development time and/or resource
requirements are underestimated. Which of the following techniques would provide the GREATEST
assistance in developing an estimate of project duration?
A. Function point analysis
B. PERT chart
C. Rapid application development
D. Object-oriented system development
165. Sending a message and a message hash encrypted by the sender's private key will ensure:
A. authenticity and integrity.
B. authenticity and privacy.
C. integrity and privacy.
D. privacy and nonrepudiation.
166. An IS auditor was hired to review e-business security. The IS auditor's first task was to
examine each existing e-business application looking for vulnerabilities. What would be the next
task?
A. Report the risks to the CIO and CEO immediately
B. Examine e-business application in development
C. Identif y threats and likelihood of occurrence
D. Check the budget available for risk management
168. A web server is attacked and compromised. Which of the following should be performed FIRST
to handle the incident?
A. Dump the volatile storage data to a disk.
B. Run the server in a f ail-safe mode.
C. Disconnect the web server from the network.
D. Shut down the web server.
170. Which of the following is the MOST effective control when granting temporary access to
vendors?
A. Vendor access corresponds to the service level agreement (SLA).
B. User accounts are created with expiration dates and are based on services provided.
C. Administrator access is provided for a limited period.
D. User IDs are deleted when the work is completed.
171. An IS auditor who has discovered unauthorized transactions during a review of EDI
transactions is likely to recommend improving the:
A. EDI trading partner agreements.
B. physical controls for terminals.
C. authentication techniques for sending and receiving messages.
D. program change control procedures.
172. From a control perspective, the PRIMARY objective of classifying information assets is to:
A. establish guidelines for the level of access controls that should be assigned.
B. ensure access controls are assigned to all information assets.
C. assist management and auditors in risk assessment.
D. identify which assets need to be insured against losses.
173. Business units are concerned about the performance of a newly implemented system. Which
of the following should an IS auditor recommend?
A. Develop a baseline and monitor system usage.
B. Def ine alternate processing procedures.
C. Prepare the maintenance manual.
D. Implement the changes users have suggested.
174. When developing a business continuity plan (BCP), which of the following tools should be
used to gain an understanding of the organization's business processes?
A. Business continuity self-audit
B. Resource recovery analysis
C. Risk assessment
D. Gap analysis
175. A team conducting a risk analysis is having difficulty projecting the financial losses that could
result from a risk. To evaluate the potential losses, the team should:
A. compute the amortization of the related assets.
B. calculate a return on investment (ROI).
C. apply a qualitative approach.
D. spend the time needed to define exactly the loss amount.
176. After observing suspicious activities in a server, a manager requests a forensic analysis.
Which of the following findings should be of MOST concern to the investigator?
A. Server is a member of a workgroup and not part of the server domain
B. Guest account is enabled on the server
C. Recently, 100 users were created in the server
D. Audit logs are not enabled for the server
.
177. An organization is implementing a new system to replace a legacy system. Which of the
following conversion practices creates the GREATEST risk?
A. Pilot
B. Parallel
C. Direct cutover
D. Phased
178. Which of the following is a network diagnostic tool that monitors and records network
information?
A. Online monitor
B. Downtime report
C. Help desk report
D. Protocol analyzer
179. Which of the following is the initial step in creating a firewall policy?
A. A cost-benefit analysis of methods for securing the applications
B. Identification of network applications to be externally accessed
C. Identif ication of vulnerabilities associated with network applications to be externally accessed
D. Creation of an applications traffic matrix showing protection methods
180. Which of the following components is responsible for the collection of data in an intrusion
detection system (IDS)?
A. Analyzer
B. Administration console
C. User interf ace
D. Sensor
181. The purpose of a checksum on an amount field in an electronic data interchange (EDI)
communication of financial transactions is to ensure:
A. integrity.
B. authenticity.
C. authorization.
D. nonrepudiation.
182. Minimum password length and password complexity verification are examples of:
A. detection controls.
B. control objectives.
C. audit objectives.
D. control procedures.
184. Which of the following would be the BEST access control procedure?
A. The data owner f ormally authorizes access and an administrator implements the user
authorization tables.
B. Authorized staff implements the user authorization tables and the data owner sanctions them.
C. The data owner and an IS manager jointly create and update the user authorization tables.
D. The data owner creates and updates the user authorization tables.
185. Accountability for the maintenance of appropriate security measures over information assets
resides with the:
A. security administrator.
B. systems administrator.
C. data and systems owners.
D. systems operations group.
186. Which of the following is a dynamic analysis tool for the purpose of testing software modules?
A. Black box test
B. Desk checking
C. Structured walkthrough
D. Design and code
187. In a client-server architecture, a domain name service (DNS) is MOST important because it
provides the:
A. address of the domain server.
B. resolution service for the name/address.
C. IP addresses for the Internet.
D. domain name system.
188. Which of the following is an advantage of the top-down approach to software testing?
A. Interf ace errors are identified early
B. Testing can be started before all programs are complete
C. It is more ef fective than other testing approaches
D. Errors in critical modules are detected sooner
189. An organization currently using tape backups takes one full backup weekly and incremental
backups daily. They recently augmented their tape backup procedures with a backup-to-disk
solution. This is appropriate because:
A. f ast synthetic backups for offsite storage are supported.
B. backup to disk is always significantly faster than backup to tape.
C. tape libraries are no longer needed.
D. data storage on disks is more reliable than on tapes.
191. Which of the following message services provides the strongest evidence that a specific
action has occurred?
A. Proof of delivery
B. Nonrepudiation
C. Proof of submission
D. Message origin authentication
.
193. Which of the following exposures could be caused by a line grabbing technique?
A. Unauthorized data access
B. Excessive CPU cycle usage
C. Lockout of terminal polling
D. Multiplexor control dysfunction
194. Which of the following antispam filtering techniques would BEST prevent a valid, variable-
length e-mail message containing a heavily weighted spam keyword from being labeled as spam?
A. Heuristic (rule-based)
B. Signature-based
C. Pattern matching
D. Bayesian (statistical)
197. The GREATEST advantage of rapid application development (RAD) over the tradi tional system
development life cycle (SDLC) is that it:
A. f acilitates user involvement.
B. allows early testing of technical features.
C. f acilitates conversion to the new system.
D. shortens the development time frame.
198. Web and e-mail filtering tools are PRIMARILY valuable to an organization because they:
A. protect the organization from viruses and nonbusiness materials.
B. maximize employee performance.
C. saf eguard the organization's image.
D. assist the organization in preventing legal issues
199. After installing a network, an organization installed a vulnerability assessment tool or security
scanner to identify possible weaknesses. Which is the MOST serious risk associated with such
tools?
A. Differential reporting
B. False-positive reporting
C. False-negative reporting
D. Less-detail reporting
200. IS management recently replaced its existing wired local area network (LAN) with a wireless
infrastructure to accommodate the increased use of mobile devices within the organization. This
will increase the risk of which of the following attacks?
A. Port scanning
B. Back door
C. Man-in-the-middle
D. War driving