Skip to Content

ISACA CISA Certified Information Systems Auditor Exam Questions and Answers – 16

The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.

ISACA Certified Information Systems Auditor (CISA) Exam Questions and Answers

CISA Question 1601

Question

Which of the following refers to an important procedure when evaluating database security?

A. performing vulnerability assessments against the database.
B. performing data check against the database.
C. performing dictionary check against the database.
D. performing capacity check against the database system.
E. None of the choices.

Answer

A. performing vulnerability assessments against the database.

Explanation

Databases provide many layers and types of security, including Access control, Auditing, Authentication, Encryption and Integrity controls. An important procedure when evaluating database security is performing vulnerability assessments against the database. Database administrators or Information security administrators run vulnerability scans on databases to discover misconfiguration of controls within the layers mentioned above along with known vulnerabilities within the database software.

CISA Question 1602

Question

Sophisticated database systems provide many layers and types of security, including (Choose three.):

A. Access control
B. Auditing
C. Encryption
D. Integrity controls
E. Compression controls

Answer

A. Access control
B. Auditing
C. Encryption
D. Integrity controls

Explanation

Sophisticated database systems provide many layers and types of security, including Access control, Auditing, Authentication, Encryption and Integrity controls.
An important procedure when evaluating database security is performing vulnerability assessments against the database. Database administrators or Information security administrators run vulnerability scans on databases to discover misconfiguration of controls within the layers mentioned above along with known vulnerabilities within the database software.

CISA Question 1603

Question

The Federal Information Processing Standards (FIPS) are primarily for use by (Choose two.):

A. all non-military government agencies
B. US government contractors
C. all military government agencies
D. all private and public colleges in the US
E. None of the choices.

Answer

A. all non-military government agencies
B. US government contractors

Explanation

Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States Federal government for use by all nonmilitary government agencies and by government contractors. Many FIPS standards are modified versions of standards used in the wider community.

CISA Question 1604

Question

The Federal Information Processing Standards (FIPS) were developed by:

A. the United States Federal government
B. ANSI
C. ISO
D. IEEE
E. IANA
F. None of the choices.

Answer

A. the United States Federal government

Explanation

Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States Federal government for use by all nonmilitary government agencies and by government contractors. Many FIPS standards are modified versions of standards used in the wider community.

CISA Question 1605

Question

Which of the following correctly describe the potential problem of deploying Wi-Fi Protected Access to secure your wireless network?

A. potential compatibility problems with wireless network interface cards.
B. potential compatibility problems with wireless access points.
C. potential performance problems with wireless network interface cards.
D. potential performance problems with wireless access points.
E. None of the choices.

Answer

B. potential compatibility problems with wireless access points.

Explanation

Wi-Fi Protected Access (WPA / WPA2) is a class of systems to secure wireless computer networks. It implements the majority of the IEEE 802.11i standard, and is designed to work with all wireless network interface cards (but not necessarily with first generation wireless access points).

CISA Question 1606

Question

Cisco IOS based routers perform basic traffic filtering via which of the following mechanisms?

A. datagram scanning
B. access lists
C. stateful inspection
D. state checking
E. link progressing
F. None of the choices.

Answer

B. access lists

Explanation

In addition to deploying stateful firewall, you may setup basic traffic filtering on a more sophisticated router. As an example, on a Cisco IOS based router you may use ip access lists (ACL) to perform basic filtering on the network edge. Note that if they have denied too much traffic, something is obviously being too restrictive and you may want to reconfigure them.

CISA Question 1607

Question

Iptables is based on which of the following frameworks?

A. Netfilter
B. NetDoom
C. NetCheck
D. NetSecure
E. None of the choices.

Answer

A. Netfilter

Explanation

ipchains is a free software based firewall running on earlier Linux. It is a rewrite of ipfwadm but is superseded by iptables in Linux 2.4 and above.
Iptables controls the packet filtering and NAT components within the Linux kernel. It is based on Netfilter, a framework which provides a set of hooks within the Linux kernel for intercepting and manipulating network packets.

CISA Question 1608

Question

Which of the following is a rewrite of ipfwadm?

A. ipchains
B. iptables
C. Netfilter
D. ipcook
E. None of the choices.

Answer

A. ipchains

Explanation

ipchains is a free software based firewall running on earlier Linux. It is a rewrite of ipfwadm but is superseded by iptables in Linux 2.4 and above. Iptables controls the packet filtering and NAT components within the Linux kernel. It is based on Netfilter, a framework which provides a set of hooks within the Linux kernel for intercepting and manipulating network packets.

CISA Question 1609

Question

You should know the difference between an exploit and a vulnerability. Which of the following refers to a weakness in the system?

A. exploit
B. vulnerability
C. both

Answer

B. vulnerability

Explanation

You should know the difference between an exploit and a vulnerability. An exploit refers to software, data, or commands capable of taking advantage of a bug, glitch or vulnerability in order to cause unintended behavior. Vulnerability in this sense refers to a weakness in the system.

CISA Question 1610

Question

Which of the following types of spyware was originally designed for determining the sources of error or for measuring staff productivity?

A. Keywords logging
B. Keystroke logging
C. Directory logging
D. Password logging
E. None of the choices.

Answer

B. Keystroke logging

Explanation

Keystroke logging (in the form of spyware) was originally a function of diagnostic tool deployed by software developers for capturing user’s keystrokes.
This is done for determining the sources of error or for measuring staff productivity.

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. We need money to operate the site, and almost all of it comes from online advertising. Please support us by disabling these ads blocker.

Please disable ad blocker