Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 125

Mary Smith

Wed, 26 Mar 2025

CISA—Certified Information Systems Auditor - Part 125

1. There are several types of penetration tests depending upon the scope, objective and nature of a test. Which of the following describes a penetration test where you attack and attempt to circumvent the controls of the targeted network from the outside, usually the Internet?

A) External Testing
B) Internal Testing
C) Blind Testing
D) Targeted Testing



2. Which of the following is penetration test where the penetration tester is provided with limited or no knowledge of the target's information systems?

A) External Testing
B) Internal Testing
C) Blind Testing
D) Targeted Testing



3. Which of the following is an environmental issue caused by electric storms or noisy electric equipment and may also cause computer system to hang or crash?

A) Sag
B) Blackout
C) Brownout
D) EMI



4. Which of the following term describes a failure of an electric utility company to supply power within acceptable range?

A) Sag
B) Blackout
C) Brownout
D) EMI



5. Which of the following statement is NOT true about smoke detector?

A) The Smoke detectors should be above and below the ceiling tiles throughout the facilities and below the raised in the computer room floor
B) The smoke detector should produce an audible alarm when activated and be linked to a monitored station
C) The location of the smoke detector should be marked on the tiling for easy identification and access
D) Smoke detector should replace fire suppression system



1. Right Answer: A
Explanation: External testing refers to attack and control circumvention attempts on a target's network perimeter from outside the target's system, usually the Internet.For the CISA exam you should know penetration test types listed below:External Testing -Refers to attack and control circumvention attempts on a target's network perimeter from outside the target's system, usually the InternetInternal Testing '' Refers to attack and control circumvention attempt on target from within the perimeter. The objective is to identify what would occur if the external perimeter was successfully compromised and/or an authorized user from within the network wanted to compromise security of a specific resource on a network.Blind Testing -Refers to the condition of testing when the penetration tester is provided with limited or no knowledge of the target's information systems. Such testing is expensive, since penetration tester have to research the target and profile it based on publicly available information.Double Blind Testing -It is an extension of blind testing, since the administrator and security staff at the target are also not aware of test. Such a testing can effectively evaluate the incident handling and response capability of the target and how well managed the environment is.Targeted Testing '' Refers to attack and control circumvention attempts on the target, while both the target's IT team and penetration tester are aware of the testing activities. Penetration testers are provided with information related to target and network design. Additionally, they are also provided with a limited privilege user account to be used as a starting point to identify privilege escalation possibilities in the system.The following were incorrect answers:Internal Testing '' Refers to attack and control circumvention attempt on target from within the perimeter. The objective is to identify what would occur if the external perimeter was successfully compromised and/or an authorized user from within the network wanted to compromise security of a specific resource on a network.Blind Testing -Refers to the condition of testing when the penetration tester is provided with limited or no knowledge of the target's information systems. Such a testing is expensive, since penetration tester have to research the target and profile it based on publicly available information.Targeted Testing '' Refers to attack and control circumvention attempts on the target, while both the target's IT team and penetration tester are aware of the testing activities. Penetration testers are provided with information related to target and network design. Additionally, they are also provided with a limited privilege user account to be used as a starting point to identify privilege escalation possibilities in the system.Following reference(s) were/was used to create this question:CISA review manual 2014 Page number 369

2. Right Answer: C
Explanation: Blind Testing refers to the condition of testing when the penetration tester is provided with limited or no knowledge of the target. Such a testing is expensive, since the penetration tester has to research the target and profile it based on publicly available information.For your exam you should know below mentioned penetration typesExternal Testing -Refers to attack and control circumvention attempts on a target's network perimeter from outside the target's system is usually the InternetInternal Testing '' Refers to attack and control circumvention attempt on target from within the perimeter. The objective is to identify what would occur if the external perimeter was successfully compromised and/or an authorized user from within the network wanted to compromise security of a specific resource on a network.Blind Testing -Refers to the condition of testing when the penetration tester is provided with limited or no knowledge of the target's information systems. Such a testing is expensive, since penetration tester have to research the target and profile it based on publicly available information.Double Blind Testing -It is an extension of blind testing, since the administrator and security staff at the target are also not aware of test. Such a testing can effectively evaluate the incident handling and response capability of the target.Targeted Testing '' Refers to attack and control circumvention attempts on the target, while both the target's IT team and penetration tester are aware of the testing activities. Penetration testers are provided with information related to target and network design. Additionally, they are also provided with a limited privilege user account to be used as a starting point to identify privilege escalation possibilities in the system.The following were incorrect answers:External Testing -Refers to attack and control circumvention attempts on a target's network perimeter from outside the target's system is usually the InternetInternal Testing '' Refers to attack and control circumvention attempt on target from within the perimeter. The objective is to identify what would occur if the external perimeter was successfully compromised and/or an authorized user from within the network wanted to compromise security of a specific resource on a network.Targeted Testing '' Refers to attack and control circumvention attempts on the target, while both the target's IT team and penetration tester are aware of the testing activities. Penetration testers are provided with information related to target and network design. Additionally, they are also provided with a limited privilege user account to be used as a starting point to identify privilege escalation possibilities in the system.The Following reference(s) were/was used to create this question:CISA review manual 2014 Page number 369

3. Right Answer: D
Explanation: The electromagnetic interference (EMI) caused by electrical storms or noisy electrical equipments. The interference may cause computer system to hang or crash as well as damages similar to those caused by sags, spike and surges.Because Unshielded Twisted Pair cables does not have shielding like shielded twisted-pair cables, UTP is susceptible to interference from external electrical sources, which could reduce the integrity of the signal. Also, to intercept transmitted data, an intruder can install a tap on the cable or monitor the radiation from the wire. Thus, UTP may not be a good choice when transmitting very sensitive data or when installed in an environment with much electromagnetic interference(EMI) or radio frequency interference (RFI). Despite its drawbacks, UTP is the most common cable type. UTP is inexpensive, can be easily bent during installation, and, in most cases, the risk from the above drawbacks is not enough to justify more expensive cables.For your exam you should know below information about power failureTotal Failure (Blackout) '' A complete loss of electric power, which may span from a single building to an entire geographical are and is often caused by weather conditions or inability of an electric utility company to meet user demandsSeverely reduced voltage (brownout) '' The failure of an electric utility company to supply power within acceptable range. Such a failure places a strain on electronic equipment and may limit their operational life or even cause permanent damage.Sags, spike and surge '' Temporary and rapid decreases (sag) or increases (spike and surges) in a voltage levels. These anomalies can cause loss of data, data corruption, network transmission errors or physical damage to hardware devices.Electromagnetic interference (EMI) - The electromagnetic interference (EMI) caused by electrical storms or noisy electrical equipments. The interference may cause computer system to hang or crash as well as damages similar to those caused by sags, spike and surges.The following were incorrect answers:Sag '' Temporarily rapid decrease in a voltage.Total Failure (Blackout) '' A complete loss of electric power, which may span from a single building to an entire geographical are and is often caused by weather conditions or inability of an electric utility company to meet user demandsSeverely reduced voltage (brownout) '' The failure of an electric utility company to supply power within acceptable range. Such a failure places a strain on electronic equipment and may limit their operational life or even cause permanent damage.Following reference(s) were/was used to create this question:CISA review manual 2014 Page number372andHernandez CISSP, Steven (2012-12-21). Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press) (Kindle Locations 6507-6512). AcerbicPublications. Kindle Edition.

4. Right Answer: C
Explanation: The failure of an electric utility company to supply power within acceptable range. Such a failure places a strain on electronic equipment and may limit their operational life or even cause permanent damage.For CISA exam you should know below information about power failureTotal Failure (Blackout) '' A complete loss of electric power, which may span from a single building to an entire geographical are and is often caused by weather conditions or inability of an electric utility company to meet user demandsSeverely reduced voltage (brownout) '' The failure of an electric utility company to supply power within acceptable range. Such a failure places a strain on electronic equipment and may limit their operational life or even cause permanent damage.Sags, spike and surge '' Temporary and rapid decreases (sag) or increases (spike and surges) in a voltage levels. These anomalies can cause loss of data, data corruption, network transmission errors or physical damage to hardware devices.Electromagnetic interference (EMI) - The electromagnetic interference (EMI) caused by electrical storms or noisy electrical equipments. The interference may cause computer system to hang or crash as well as damages similar to those caused by sags, spike and surges.The following were incorrect answers:Sag '' Temporarily rapid decrease in a voltage.Total Failure (Blackout) '' A complete loss of electric power, which may span from a single building to an entire geographical are and is often caused by weather conditions or inability of an electric utility company to meet user demandsSeverely reduced voltage (brownout) '' The failure of an electric utility company to supply power within acceptable range. Such a failure places a strain on electronic equipment and may limit their operational life or even cause permanent damage.Following reference(s) were/was used to create this question:CISA review manual 2014 Page number372

5. Right Answer: D
Explanation: The word NOT is the keyword used in the question. You need to find out a statement which is not applicable to smoke detector. Smoke detector should supplement, not replace, fire suppression system.For CISA exam you should know below information about smoke detector.The Smoke detectors should be above and below the ceiling tiles throughout the facilities and below the raised computer room floor.The smoke detector should produce an audible alarm when activated be linked to a monitored stationThe location of the smoke detector should be marked on the tiling for easy identification and access.Smoke detector should supplement, not replace, fire suppression systemThe following were incorrect answers:The other presented options are valid statement about smoke detector.Following reference(s) were/was used to create this question:CISA review manual 2014 Page number373

0 Comments

Leave a comment