The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 1661
- Question
- Answer
- Explanation
- CISA Question 1662
- Question
- Answer
- Explanation
- CISA Question 1663
- Question
- Answer
- Explanation
- CISA Question 1664
- Question
- Answer
- Explanation
- CISA Question 1665
- Question
- Answer
- Explanation
- CISA Question 1666
- Question
- Answer
- Explanation
- CISA Question 1667
- Question
- Answer
- CISA Question 1668
- Question
- Answer
- Explanation
- CISA Question 1669
- Question
- Answer
- Explanation
- CISA Question 1670
- Question
- Answer
- Explanation
CISA Question 1661
Question
In a botnet, mailbot logs into a particular type of system for making coordinated attack attempts. What type of system is this?
A. Chat system
B. SMS system
C. Email system
D. Log system
E. Kernel system
F. None of the choices.
Answer
A. Chat system
Explanation
In order to coordinate the activity of many infected computers, attackers have used coordinating systems known as botnets. In a botnet, the malware or mailbot logs in to an Internet Relay Chat channel or other chat system. The attacker can then give instructions to all the infected systems simultaneously.
CISA Question 1662
Question
In order to coordinate the activity of many infected computers, attackers have used coordinating systems known as:
A. wormnets
B. trojannets
C. spynets
D. botnets
E. rootnets
F. backdoor
Answer
D. botnets
Explanation
In order to coordinate the activity of many infected computers, attackers are used coordinating systems known as botnets. In a botnet, the malware or mailbot logs in to an Internet Relay Chat channel or other chat system. The attacker can then give instructions to all the infected systems simultaneously.
CISA Question 1663
Question
To install backdoors, hackers generally prefer to use:
A. either Trojan horse or computer worm.
B. either Tripwire or computer virus.
C. either eavedropper or computer worm.
D. either Trojan horse or eavedropper.
E. None of the choices.
Answer
A. either Trojan horse or computer worm.
Explanation
A backdoor is a method of bypassing normal authentication procedures.
Many computer manufacturers used to preinstall backdoors on their systems to provide technical support for customers. Hackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors, hackers prefer to use either Trojan horse or computer worm.
CISA Question 1664
Question
Which of the following refers to a method of bypassing normal system authentication procedures?
A. virus
B. worm
C. trojan horse
D. spyware
E. rootkits
F. backdoor
G. None of the choices.
Answer
F. backdoor
Explanation
A backdoor is a method of bypassing normal authentication procedures.
Many computer manufacturers used to preinstall backdoors on their systems to provide technical support for customers. Hackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors, hackers prefer to use either Trojan horse or computer worm.
CISA Question 1665
Question
Which of the following terms is used more generally for describing concealment routines in a malicious program?
A. virus
B. worm
C. trojan horse
D. spyware
E. rootkits
F. backdoor
G. None of the choices.
Answer
E. rootkits
Explanation
Rootkits can prevent a malicious process from being reported in the process table, or keep its files from being read. Originally, a rootkit was a set of tools installed by a human attacker on a Unix system where the attacker had gained administrator access. Today, the term is used more generally for concealment routines in a malicious program.
CISA Question 1666
Question
A Trojan horse’s payload would almost always take damaging effect immediately.
A. True
B. False
Answer
B. False
Explanation
Broadly speaking, a Trojan horse is any program that invites the user to run it, but conceals a harmful or malicious payload. The payload may take effect immediately and can lead to immediate yet undesirable effects, or more commonly it may install further harmful software into the user’s system to serve the creator’s longer-term goals.
CISA Question 1667
Question
Which of the following refers to any program that invites the user to run it but conceals a harmful or malicious payload?
A. virus
B. worm
C. trojan horse
D. spyware
E. rootkits
F. None of the choices.
Answer
C. trojan horse
CISA Question 1668
Question
Which of the following are valid examples of Malware:
A. viruses
B. worms
C. trojan horses
D. spyware
E. All of the above
Answer
E. All of the above
Explanation
Malware is software designed to infiltrate or damage a computer system without the owner’s informed consent. Software is considered malware based on the intent of the creator rather than any particular features. It includes computer viruses, worms, trojan horses, spyware, adware, and other malicious and unwanted software.
CISA Question 1669
Question
Software is considered malware based on:
A. the intent of the creator.
B. its particular features.
C. its location.
D. its compatibility.
E. None of the choices.
Answer
A. the intent of the creator.
Explanation
Malware is software designed to infiltrate or damage a computer system without the owner’s informed consent. Software is considered malware based on the intent of the creator rather than any particular features. It includes computer viruses, worms, trojan horses, spyware, adware, and other malicious and unwanted software.
CISA Question 1670
Question
Host Based ILD&P primarily addresses the issue of:
A. information integrity
B. information accuracy
C. information validity
D. information leakage
E. None of the choices.
Answer
D. information leakage
Explanation
Information Leakage Detection and Prevention (ILD&P) is a computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders. Network ILD&P are gateway-based systems installed on the organization’s internet network connection and analyze network traffic to search for unauthorized information transmissions. Host Based ILD&P systems run on end-user workstations to monitor and control access to physical devices and access information before it has been encrypted.