Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 108

Mary Smith

Mon, 24 Mar 2025

CISA—Certified Information Systems Auditor - Part 108

1. Following a successful attack on an organization's web server, which of the following actions should be performed FIRST?

A) Review the boundary configuration rules to ensure that outbound packets are limited
B) Evaluate and deploy an intrusion detection system
C) Periodically scan the network for systems with well-known vulnerabilities
D) Establish reference systems using cryptographic checksum tools



2. Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?

A) Validity check
B) Reasonableness check
C) Parity check
D) Limit check



3. A firewall has been installed on the company's web server. Which concern does the firewall address?

A) Availability of the information
B) Unauthorized modification of information by internal users
C) Accessing information by the outside world
D) Connectivity to the Internet



4. An organization is within a jurisdiction where new regulations have recently been announced to restrict cross-border data transfer of personally identifiable information (PII). Which of the following IT decisions will MOST likely need to be assessed in the context of this change?

A) Hosting the payroll system at an external cloud service provider
B) Purchasing cyber insurance from an overseas insurance company
C) Applying encryption to database hosting PII data
D) Hiring IT consultants from overseas



5. A recent audit concluded that an organization's information security system was weak and that monitoring would likely fail to detect penetration. Which of the following would be the MOST appropriate recommendation?

A) Look continually for new criminal behavior and attacks on sensitive data
B) Establish a clear policy related to security and the handling of sensitive data
C) Encrypt sensitive data while strengthening the system
D) Identify and periodically remove sensitive data that is no longer needed



1. Right Answer: A
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: D
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment