CISA PRACTICE QUESTION 700

上传人:沈*** 文档编号:42281640 上传时间:2021-11-25 格式:DOC 页数:212 大小:1.71MB
收藏 版权申诉 举报 下载
CISA PRACTICE QUESTION 700_第1页
第1页 / 共212页
CISA PRACTICE QUESTION 700_第2页
第2页 / 共212页
CISA PRACTICE QUESTION 700_第3页
第3页 / 共212页
资源描述:

《CISA PRACTICE QUESTION 700》由会员分享,可在线阅读,更多相关《CISA PRACTICE QUESTION 700(212页珍藏版)》请在装配图网上搜索。

1、2008 CISA PRACTICE QUESTION QUESTIONS: 1、The extent to which data will be collected during an IS audit should be determined based on the: A、availability of critical and required information. B、auditors familiarity with the circumstances. C、auditees ability to find relevant evidence. D、purpose and sc

2、ope of the audit being done. ANSWER: D NOTE: The extent to which data will be collected during an IS audit should be related directly to the scope and purpose of the audit. An audit with a narrow purpose and scope would result most likely in less data collection, than an audit with a wider purpose a

3、nd scope. The scope of an IS audit should not be constrained by the ease of obtaining the information or by the auditors familiarity with the area being audited. Collecting all the required evidence is a required element of an IS audit, and the scope of the audit should not be limited by the auditee

4、s ability to find relevant evidence. 2、Which of the following ensures a senders authenticity and an e-mails confidentiality? A、Encrypting the hash of the message with the senders private key and thereafter encrypting the hash of the message with the receivers public key B、The sender digitally signin

5、g the message and thereafter encrypting the hash of the message with the senders private key C、Encrypting the hash of the message with the senders private key and thereafter encrypting the message with the receivers public key D、Encrypting the message with the senders private key and encrypting the

6、message hash with the receivers public key ANSWER: C NOTE: To ensure authenticity and confidentiality, a message must be encrypted twice: first with the senders private key, and then with the receivers public key. The receiver can decrypt the message, thus ensuring confidentiality of the message. Th

7、ereafter, the decrypted message can be decrypted with the public key of the sender, ensuring authenticity of the message. Encrypting the message with the senders private key enables anyone to decrypt it. 3、Which of the following is the GREATEST advantage of elliptic curve encryption over RSA encrypt

8、ion? A、Computation speed B、Ability to support digital signatures C、Simpler key distribution D、Greater strength for a given key length ANSWER: A NOTE: The main advantage of elliptic curve encryption over RSA encryption is its computation speed. This method was first independently suggested by Neal Ko

9、blitz and Victor S. Miller. Both encryption methods support digital signatures and are used for public key encryption and distribution. However, a stronger key per se does not necessarily guarantee better performance, but rather the actual algorithm employed. 4、Which of the following controls would

10、provide the GREATEST assurance of database integrity? A、Audit log procedures B、Table link/reference checks C、Query/table access time checks D、Rollback and rollforward database features ANSWER: B NOTE: Performing table link/reference checks serves to detect table linking errors (such as completeness

11、and accuracy of the contents of the database), and thus provides the greatest assurance of database integrity. Audit log procedures enable recording of all events that have been identified and help in tracing the events. However, they only point to the event and do not ensure completeness or accurac

12、y of the databases contents. Querying/monitoring table access time checks helps designers improve database performance, but not integrity. Rollback and rollforward database features ensure recovery from an abnormal disruption. They assure the integrity of the transaction that was being processed at

13、the time of disruption, but do not provide assurance on the integrity of the contents of the database. 5、A benefit of open system architecture is that it: A、facilitates interoperability. B、facilitates the integration of proprietary components. C、will be a basis for volume discounts from equipment ve

14、ndors. D、allows for the achievement of more economies of scale for equipment. ANSWER: A NOTE: Open systems are those for which suppliers provide components whose interfaces are defined by public standards, thus facilitating interoperability between systems made by different vendors. In contrast, clo

15、sed system components are built to proprietary standards so that other suppliers systems cannot or will not interface with existing systems. 6、An IS auditor discovers that developers have operator access to the command line of a production environment operating system. Which of the following control

16、s would BEST mitigate the risk of undetected and unauthorized program changes to the production environment? A、Commands typed on the command line are logged B、Hash keys are calculated periodically for programs and matched against hash keys calculated for the most recent authorized versions of the pr

17、ograms C、Access to the operating system command line is granted through an access restriction tool with preapproved rights D、Software development tools and compilers have been removed from the production environment ANSWER: B NOTE: The matching of hash keys over time would allow detection of changes

18、 to files. Choice A is incorrect because having a log is not a control, reviewing the log is a control. Choice C is incorrect because the access was already grantedit does not matter how. Choice D is wrong because files can be copied to and from the production environment. 7、Which of the following B

19、EST ensures the integrity of a servers operating system? A、Protecting the server in a secure location B、Setting a boot password C、Hardening the server configuration D、Implementing activity logging ANSWER: C NOTE: Hardening a system means to configure it in the most secure manner (install latest secu

20、rity patches, properly define the access authorization for users and administrators, disable insecure options and uninstall unused services) to prevent nonprivileged users from gaining the right to execute privileged instructions and thus take control of the entire machine, jeopardizing the OSs inte

21、grity. Protecting the server in a secure location and setting a boot password are good practices, but do not ensure that a user will not try to exploit logical vulnerabilities and compromise the OS. Activity logging has two weaknesses in this scenarioit is a detective control (not a preventive one),

22、 and the attacker who already gained privileged access can modify logs or disable them. 8、An investment advisor e-mails periodic newsletters to clients and wants reasonable assurance that no one has modified the newsletter. This objective can be achieved by: A、encrypting the hash of the newsletter u

23、sing the advisors private key. B、encrypting the hash of the newsletter using the advisors public key. C、digitally signing the document using the advisors private key. D、encrypting the newsletter using the advisors private key. ANSWER: A NOTE: There is no attempt on the part of the investment advisor

24、 to prove their identity or to keep the newsletter confidential. The objective is to assure the receivers that it came to them without any modification, i.e., it has message integrity. Choice A is correct because the hash is encrypted using the advisors private key. The recipients can open the newsl

25、etter, recompute the hash and decrypt the received hash using the advisors public key. If the two hashes are equal, the newsletter was not modified in transit. Choice B is not feasible, for no one other than the investment advisor can open it. Choice C addresses sender authentication but not message

26、 integrity. Choice D addresses confidentiality, but not message integrity, because anyone can obtain the investment advisors public key, decrypt the newsletter, modify it and send it to others. The interceptor will not be able to use the advisors private key, because they do not have it. Anything en

27、crypted using the interceptors private key can be decrypted by the receiver only by using their public key. 9、In reviewing the IS short-range (tactical) plan, an IS auditor should determine whether: A、there is an integration of IS and business staffs within projects. B、there is a clear definition of

28、 the IS mission and vision. C、a strategic information technology planning methodology is in place. D、the plan correlates business objectives to IS goals and objectives. ANSWER: A NOTE: The integration of IS and business staff in projects is an operational issue and should be considered while reviewi

29、ng the short-range plan. A strategic plan would provide a framework for the IS short-range plan. Choices B, C and D are areas covered by a strategic plan. 10、An IS auditor is performing an audit of a network operating system. Which of the following is a user feature the IS auditor should review? A、A

30、vailability of online network documentation B、Support of terminal access to remote hosts C、Handling file transfer between hosts and interuser communications D、Performance management, audit and control ANSWER: A NOTE: Network operating system user features include online availability of network docum

31、entation. Other features would be user access to various resources of network hosts, user authorization to access particular resources, and the network and host computers used without special user actions or commands. Choices B, C and D are examples of network operating systems functions. 11、An inst

32、alled Ethernet cable run in an unshielded twisted pair (UTP) network is more than 100 meters long. Which of the following could be caused by the length of the cable? A、Electromagnetic interference (EMI) B、Cross-talk C、Dispersion D、Attenuation ANSWER: D NOTE: Attenuation is the weakening of signals d

33、uring transmission. When the signal becomes weak, it begins to read a 1 for a 0, and the user may experience communication problems. UTP faces attenuation around 100 meters. Electromagnetic interference (EMI) is caused by outside electromagnetic waves affecting the desired signals, which is not the

34、case here. Cross-talk has nothing to do with the length of the UTP cable. 12、Which of the following encrypt/decrypt steps provides the GREATEST assurance of achieving confidentiality, message integrity and nonrepudiation by either sender or recipient? A、The recipient uses their private key to decryp

35、t the secret key. B、The encrypted prehash code and the message are encrypted using a secret key. C、The encrypted prehash code is derived mathematically from the message to be sent. D、The recipient uses the senders public key, verified with a certificate authority, to decrypt the prehash code. ANSWER

36、: D NOTE: Most encrypted transactions use a combination of private keys, public keys, secret keys, hash functions and digital certificates to achieve confidentiality, message integrity and nonrepudiation by either sender or recipient. The recipient uses the senders public key to decrypt the prehash

37、code into a posthash code, which when equaling the prehash code, verifies the identity of the sender and that the message has not been changed in route; this would provide the greatest assurance. Each sender and recipient has a private key known only to themselves and a public key, which can be know

38、n by anyone. Each encryption/decryption process requires at least one public key and one private key, and both must be from the same party. A single, secret key is used to encrypt the message, because secret key encryption requires less processing power than using public and private keys. A digital

39、certificate, signed by a certificate authority, validates senders and recipients public keys. 13、To determine how data are accessed across different platforms in a heterogeneous environment, an IS auditor should FIRST review: A、business software. B、infrastructure platform tools. C、application servic

40、es. D、system development tools. ANSWER: C NOTE: Projects should identify the complexities of the IT Infrastructure that can be simplified or isolated by the development of application services. Application services isolate system developers from the complexities of the IT infrastructure and offer co

41、mmon functionalities that are shared by many applications. Application services take the form of interfaces, middleware, etc. Business software focuses on business processes, whereas application services bridge the gap between applications and the IT Infrastructure components. Infrastructure platfor

42、m tools are related to core hardware and software components required for development of the IT infrastructure. Systems development tools represent development components of the IT infrastructure development. 14、The MOST significant security concern when using flash memory (e.g., USB removable disk)

43、 is that the: A、contents are highly volatile. B、data cannot be backed up. C、data can be copied. D、device may not be compatible with other peripherals. ANSWER: C NOTE: Unless properly controlled, flash memory provides an avenue for anyone to copy any content with ease. The contents stored in flash me

44、mory are not volatile. Backing up flash memory data is not a control concern, as the data are sometimes stored as a backup. Flash memory will be accessed through a PC rather than any other peripheral; therefore, compatibility is not an issue. 15、To ensure message integrity, confidentiality and nonre

45、pudiation between two parties, the MOST effective method would be to create a message digest by applying a cryptographic hashing algorithm against: A、the entire message, enciphering the message digest using the senders private key, enciphering the message with a symmetric key and enciphering the key

46、 by using the receivers public key. B、any part of the message, enciphering the message digest using the senders private key, enciphering the message with a symmetric key and enciphering the key using the receivers public key. C、the entire message, enciphering the message digest using the senders pri

47、vate key, enciphering the message with a symmetric key and enciphering both the encrypted message and digest using the receivers public key. D、the entire message, enciphering the message digest using the senders private key and enciphering the message using the receivers public key. ANSWER: A NOTE:

48、Applying a cryptographic hashing algorithm against the entire message addresses the message integrity issue. Enciphering the message digest using the senders private key addresses nonrepudiation. Encrypting the message with a symmetric key, thereafter allowing the key to be enciphered using the rece

49、ivers public key, most efficiently addresses the confidentiality of the message as well as the receivers nonrepudiation. The other choices would address only a portion of the requirements. 16、To ensure compliance with a security policy requiring that passwords be a combination of letters and numbers

50、, an IS auditor should recommend that: A、the company policy be changed. B、passwords are periodically changed. C、an automated password management tool be used. D、security awareness training is delivered. ANSWER: C NOTE: The use of an automated password management tool is a preventive control measure.

51、 The software would prevent repetition (semantic) and would enforce syntactic rules, thus making the passwords robust. It would also provide a method for ensuring frequent changes and would prevent the same user from reusing their old password for a designated period of time. Choices A, B and D do n

52、ot enforce compliance. 17、In the context of effective information security governance, the primary objective of value delivery is to: A、optimize security investments in support of business objectives. B、implement a standard set of security practices. C、institute a standards-based solution. D、impleme

53、nt a continuous improvement culture. ANSWER: A NOTE: In the context of effective information security governance, value delivery is implemented to ensure optimization of security investments in support of business objectives. The tools and techniques for implementing value delivery include implement

54、ation of a standard set of security practices, institutionalization and commoditization of standards-based solutions, and implementation of a continuous improvement culture considering security as a process, not an event. 18、In an organization where an IT security baseline has been defined, an IS au

55、ditor should FIRST ensure: A、implementation. B、compliance. C、documentation. D、sufficiency. ANSWER: D NOTE: An IS auditor should first evaluate the definition of the minimum baseline level by ensuring the sufficiency of controls. Documentation, implementation and compliance are further steps. 19、Duri

56、ng an implementation review of a multiuser distributed application, an IS auditor finds minor weaknesses in three areas-the initial setting of parameters is improperly installed, weak passwords are being used and some vital reports are not being checked properly. While preparing the audit report, th

57、e IS auditor should: A、record the observations separately with the impact of each of them marked against each respective finding. B、advise the manager of probable risks without recording the observations, as the control weaknesses are minor ones. C、record the observations and the risk arising from t

58、he collective weaknesses. D、apprise the departmental heads concerned with each observation and properly document it in the report. ANSWER: C NOTE: Individually the weaknesses are minor; however, together they have the potential to substantially weaken the overall control structure. Choices A and D r

59、eflect a failure on the part of an IS auditor to recognize the combined affect of the control weakness. Advising the local manager without reporting the facts and observations would conceal the findings from other stakeholders. 20、During a review of a business continuity plan, an IS auditor noticed

60、that the point at which a situation is declared to be a crisis has not been defined. The MAJOR risk associated with this is that: A、assessment of the situation may be delayed. B、execution of the disaster recovery plan could be impacted. C、notification of the teams might not occur. D、potential crisis

61、 recognition might be ineffective. ANSWER: B NOTE: Execution of the business continuity plan would be impacted if the organization does not know when to declare a crisis. Choices A, C and D are steps that must be performed to know whether to declare a crisis. Problem and severity assessment would pr

62、ovide information necessary in declaring a disaster. Once a potential crisis is recognized, the teams responsible for crisis management need to be notified. Delaying this step until a disaster has been declared would negate the effect of having response teams. Potential crisis recognition is the first step in responding to a disaster. 21、Which of the following tests performed by an IS auditor would be the MOST effective in determining compliance with an organizations change control procedures? A、Review software migration records and verify approvals. B、Identif

展开阅读全文
温馨提示:
1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
2: 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
3.本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!