The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 1601
- Question
- Answer
- Explanation
- CISA Question 1602
- Question
- Answer
- Explanation
- CISA Question 1603
- Question
- Answer
- Explanation
- CISA Question 1604
- Question
- Answer
- Explanation
- CISA Question 1605
- Question
- Answer
- Explanation
- CISA Question 1606
- Question
- Answer
- Explanation
- CISA Question 1607
- Question
- Answer
- Explanation
- CISA Question 1608
- Question
- Answer
- Explanation
- CISA Question 1609
- Question
- Answer
- Explanation
- CISA Question 1610
- Question
- Answer
- Explanation
CISA Question 1601
Question
Which of the following refers to an important procedure when evaluating database security?
A. performing vulnerability assessments against the database.
B. performing data check against the database.
C. performing dictionary check against the database.
D. performing capacity check against the database system.
E. None of the choices.
Answer
A. performing vulnerability assessments against the database.
Explanation
Databases provide many layers and types of security, including Access control, Auditing, Authentication, Encryption and Integrity controls. An important procedure when evaluating database security is performing vulnerability assessments against the database. Database administrators or Information security administrators run vulnerability scans on databases to discover misconfiguration of controls within the layers mentioned above along with known vulnerabilities within the database software.
CISA Question 1602
Question
Sophisticated database systems provide many layers and types of security, including (Choose three.):
A. Access control
B. Auditing
C. Encryption
D. Integrity controls
E. Compression controls
Answer
A. Access control
B. Auditing
C. Encryption
D. Integrity controls
Explanation
Sophisticated database systems provide many layers and types of security, including Access control, Auditing, Authentication, Encryption and Integrity controls.
An important procedure when evaluating database security is performing vulnerability assessments against the database. Database administrators or Information security administrators run vulnerability scans on databases to discover misconfiguration of controls within the layers mentioned above along with known vulnerabilities within the database software.
CISA Question 1603
Question
The Federal Information Processing Standards (FIPS) are primarily for use by (Choose two.):
A. all non-military government agencies
B. US government contractors
C. all military government agencies
D. all private and public colleges in the US
E. None of the choices.
Answer
A. all non-military government agencies
B. US government contractors
Explanation
Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States Federal government for use by all nonmilitary government agencies and by government contractors. Many FIPS standards are modified versions of standards used in the wider community.
CISA Question 1604
Question
The Federal Information Processing Standards (FIPS) were developed by:
A. the United States Federal government
B. ANSI
C. ISO
D. IEEE
E. IANA
F. None of the choices.
Answer
A. the United States Federal government
Explanation
Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States Federal government for use by all nonmilitary government agencies and by government contractors. Many FIPS standards are modified versions of standards used in the wider community.
CISA Question 1605
Question
Which of the following correctly describe the potential problem of deploying Wi-Fi Protected Access to secure your wireless network?
A. potential compatibility problems with wireless network interface cards.
B. potential compatibility problems with wireless access points.
C. potential performance problems with wireless network interface cards.
D. potential performance problems with wireless access points.
E. None of the choices.
Answer
B. potential compatibility problems with wireless access points.
Explanation
Wi-Fi Protected Access (WPA / WPA2) is a class of systems to secure wireless computer networks. It implements the majority of the IEEE 802.11i standard, and is designed to work with all wireless network interface cards (but not necessarily with first generation wireless access points).
CISA Question 1606
Question
Cisco IOS based routers perform basic traffic filtering via which of the following mechanisms?
A. datagram scanning
B. access lists
C. stateful inspection
D. state checking
E. link progressing
F. None of the choices.
Answer
B. access lists
Explanation
In addition to deploying stateful firewall, you may setup basic traffic filtering on a more sophisticated router. As an example, on a Cisco IOS based router you may use ip access lists (ACL) to perform basic filtering on the network edge. Note that if they have denied too much traffic, something is obviously being too restrictive and you may want to reconfigure them.
CISA Question 1607
Question
Iptables is based on which of the following frameworks?
A. Netfilter
B. NetDoom
C. NetCheck
D. NetSecure
E. None of the choices.
Answer
A. Netfilter
Explanation
ipchains is a free software based firewall running on earlier Linux. It is a rewrite of ipfwadm but is superseded by iptables in Linux 2.4 and above.
Iptables controls the packet filtering and NAT components within the Linux kernel. It is based on Netfilter, a framework which provides a set of hooks within the Linux kernel for intercepting and manipulating network packets.
CISA Question 1608
Question
Which of the following is a rewrite of ipfwadm?
A. ipchains
B. iptables
C. Netfilter
D. ipcook
E. None of the choices.
Answer
A. ipchains
Explanation
ipchains is a free software based firewall running on earlier Linux. It is a rewrite of ipfwadm but is superseded by iptables in Linux 2.4 and above. Iptables controls the packet filtering and NAT components within the Linux kernel. It is based on Netfilter, a framework which provides a set of hooks within the Linux kernel for intercepting and manipulating network packets.
CISA Question 1609
Question
You should know the difference between an exploit and a vulnerability. Which of the following refers to a weakness in the system?
A. exploit
B. vulnerability
C. both
Answer
B. vulnerability
Explanation
You should know the difference between an exploit and a vulnerability. An exploit refers to software, data, or commands capable of taking advantage of a bug, glitch or vulnerability in order to cause unintended behavior. Vulnerability in this sense refers to a weakness in the system.
CISA Question 1610
Question
Which of the following types of spyware was originally designed for determining the sources of error or for measuring staff productivity?
A. Keywords logging
B. Keystroke logging
C. Directory logging
D. Password logging
E. None of the choices.
Answer
B. Keystroke logging
Explanation
Keystroke logging (in the form of spyware) was originally a function of diagnostic tool deployed by software developers for capturing user’s keystrokes.
This is done for determining the sources of error or for measuring staff productivity.