1. Right Answer: D
Explanation: Single sign-on (SSO)is a Session/user authentication process that permits a user to enter one name and password in order to access multiple applications. The process authenticates the user for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session.SSO Advantages include -Multiple passwords are no longer requiredIt improves an administrator's ability to manage user's accounts and authorization to all associated systemsIt reduces administrative overhead in resetting forgotten password over multiple platforms and applicationsIt reduces time taken by users to logon into multiple application and platformSSO Disadvantages include -Support for all major operating system is difficultThe cost associated with SSO development can be significant when considering the nature and extent of interface development and maintenance that may be necessaryThe centralize nature of SSO presents the possibility of a single point of failure and total compromise of an organization's information asset.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 332
2. Right Answer: C
Explanation: Dial-up connectivity not based on centralize control and least preferred from security and control standpoint.Remote access user can connect remotely to their organization's networks with the same level of functionality as if they would access from within their office.In connecting to an organization's network, a common method is to use dial-up lines. Access is granted through the organization's network access server (NAS) working in concert with an organization network firewall and router. The NAS handle user authentication, access control and accounting while maintaining connectivity. The most common protocol for doing this is the Remote Access Dial-In User Service (RADIUS) and Terminal Access Controller Access ControllerSystem (TACACS).Remote access Controls include:Policy and standard -Proper authorization -Identification and authentication mechanismEncryption tool and technique such as use of VPNSystem and network management -The following reference(s) were/was used to create this question:CISA Review Manual 2014 Page number 334
3. Right Answer: B
Explanation: Trend/Variance Detection tool are used to look for anomalies in user or system behavior. For example, if a user typically logs in at 9:00 am, but one day suddenly access the system at 4:30 am, this may indicate a security problem that may need to be investigated.Other types of audit trail analysis tools should also be known for your CISA examThe following were incorrect answers:Audit Reduction tool - They are preprocessor designed to reduce the volume of audit records to facilitate manual review. Before a security review, these tool can remove many audit records known to have little security significance.Attack-signature detection tool - They look for an attack signature, which is a specific sequence of events indicative of an unauthorized access attempt. A simple example would be repeated failed logon attempts.Heuristic detection tool - Heuristic analysis is an expert based analysis that determines the susceptibility of a system towards particular threat/risk using various decision rules or weighing methods. MultiCriteria analysis (MCA) is one of the means of weighing. This method differs with statistical analysis, which bases itself on the available data/statistics.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 336andhttp://en.wikipedia.org/wiki/Heuristic_analysis
4. Right Answer: B
Explanation: CDs and DVDs are least affected by static current so it is not as important to store them into anti-static bags.CDs and DVDs Storage protection recommendations:Handle by edges or by hole in the middleBe careful not to bend the CD or DVDAvoid long term exposure to bright lightStore in a hard jewel case, not is soft sleevesAlso, you should know the media storage precautions listed below in preparation for the CISA exam:USB and portable hard drive -Avoid high temperature, humidity extremes and strong magnetic fieldTape Cartridges -Store Cartridges vertically -Store cartridges in a protective container for transportWrite-protect cartridges immediatelyHard Drive -Store hard drives in anti-static bags, and be sure that person removing them from bag is static freeIf the original box and padding for the hard drive is available, use it for shippingIf the hard drive has been in a cold environment, bring it to room temperature prior to installing and using itThe following reference(s) were/was used to create this question:Reference used - CISA review manual 2014. Page number 338
5. Right Answer: D
Explanation: It is important to read carefully the question. The word 'incorrectly' was the key word. You had to find which one of the definitions presented is incorrect. The definition of Accountability was NOT properly described. Below you have the proper definition.The correct definitions are as followsAuthenticity '' A third party must be able to verify that the content of a message is from a specific entity and nobody else.Non-repudiation '' The origin or the receipt of a specific message must be verifiable by a third party. A person cannot deny having sent a message if the message is signed by the originator.Accountability '' The action of an entity must be uniquely traceable to that entityNetwork availability '' The IT resource must be available on a timely basis to meet mission requirements or to avoid substantial losses.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 34
Write a public review