Skip to Content

ISACA CISA Certified Information Systems Auditor Exam Questions and Answers – 16

The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.

ISACA Certified Information Systems Auditor (CISA) Exam Questions and Answers

CISA Question 1661

Question

In a botnet, mailbot logs into a particular type of system for making coordinated attack attempts. What type of system is this?

A. Chat system
B. SMS system
C. Email system
D. Log system
E. Kernel system
F. None of the choices.

Answer

A. Chat system

Explanation

In order to coordinate the activity of many infected computers, attackers have used coordinating systems known as botnets. In a botnet, the malware or mailbot logs in to an Internet Relay Chat channel or other chat system. The attacker can then give instructions to all the infected systems simultaneously.

CISA Question 1662

Question

In order to coordinate the activity of many infected computers, attackers have used coordinating systems known as:

A. wormnets
B. trojannets
C. spynets
D. botnets
E. rootnets
F. backdoor

Answer

D. botnets

Explanation

In order to coordinate the activity of many infected computers, attackers are used coordinating systems known as botnets. In a botnet, the malware or mailbot logs in to an Internet Relay Chat channel or other chat system. The attacker can then give instructions to all the infected systems simultaneously.

CISA Question 1663

Question

To install backdoors, hackers generally prefer to use:

A. either Trojan horse or computer worm.
B. either Tripwire or computer virus.
C. either eavedropper or computer worm.
D. either Trojan horse or eavedropper.
E. None of the choices.

Answer

A. either Trojan horse or computer worm.

Explanation

A backdoor is a method of bypassing normal authentication procedures.
Many computer manufacturers used to preinstall backdoors on their systems to provide technical support for customers. Hackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors, hackers prefer to use either Trojan horse or computer worm.

CISA Question 1664

Question

Which of the following refers to a method of bypassing normal system authentication procedures?

A. virus
B. worm
C. trojan horse
D. spyware
E. rootkits
F. backdoor
G. None of the choices.

Answer

F. backdoor

Explanation

A backdoor is a method of bypassing normal authentication procedures.
Many computer manufacturers used to preinstall backdoors on their systems to provide technical support for customers. Hackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors, hackers prefer to use either Trojan horse or computer worm.

CISA Question 1665

Question

Which of the following terms is used more generally for describing concealment routines in a malicious program?

A. virus
B. worm
C. trojan horse
D. spyware
E. rootkits
F. backdoor
G. None of the choices.

Answer

E. rootkits

Explanation

Rootkits can prevent a malicious process from being reported in the process table, or keep its files from being read. Originally, a rootkit was a set of tools installed by a human attacker on a Unix system where the attacker had gained administrator access. Today, the term is used more generally for concealment routines in a malicious program.

CISA Question 1666

Question

A Trojan horse’s payload would almost always take damaging effect immediately.

A. True
B. False

Answer

B. False

Explanation

Broadly speaking, a Trojan horse is any program that invites the user to run it, but conceals a harmful or malicious payload. The payload may take effect immediately and can lead to immediate yet undesirable effects, or more commonly it may install further harmful software into the user’s system to serve the creator’s longer-term goals.

CISA Question 1667

Question

Which of the following refers to any program that invites the user to run it but conceals a harmful or malicious payload?

A. virus
B. worm
C. trojan horse
D. spyware
E. rootkits
F. None of the choices.

Answer

C. trojan horse

CISA Question 1668

Question

Which of the following are valid examples of Malware:

A. viruses
B. worms
C. trojan horses
D. spyware
E. All of the above

Answer

E. All of the above

Explanation

Malware is software designed to infiltrate or damage a computer system without the owner’s informed consent. Software is considered malware based on the intent of the creator rather than any particular features. It includes computer viruses, worms, trojan horses, spyware, adware, and other malicious and unwanted software.

CISA Question 1669

Question

Software is considered malware based on:

A. the intent of the creator.
B. its particular features.
C. its location.
D. its compatibility.
E. None of the choices.

Answer

A. the intent of the creator.

Explanation

Malware is software designed to infiltrate or damage a computer system without the owner’s informed consent. Software is considered malware based on the intent of the creator rather than any particular features. It includes computer viruses, worms, trojan horses, spyware, adware, and other malicious and unwanted software.

CISA Question 1670

Question

Host Based ILD&P primarily addresses the issue of:

A. information integrity
B. information accuracy
C. information validity
D. information leakage
E. None of the choices.

Answer

D. information leakage

Explanation

Information Leakage Detection and Prevention (ILD&P) is a computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders. Network ILD&P are gateway-based systems installed on the organization’s internet network connection and analyze network traffic to search for unauthorized information transmissions. Host Based ILD&P systems run on end-user workstations to monitor and control access to physical devices and access information before it has been encrypted.