Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 143

Mary Smith

Sat, 24 May 2025

CISA—Certified Information Systems Auditor - Part 143

1. Why does the IS auditor often review the system logs?

A) To get evidence of password spoofing
B) To get evidence of data copy activities
C) To determine the existence of unauthorized access to data by a user or program
D) To get evidence of password sharing



2. What is essential for the IS auditor to obtain a clear understanding of network management?

A) Security administrator access to systems
B) Systems logs of all hosts providing application services
C) A graphical map of the network topology
D) Administrator access to systems



3. How is risk affected if users have direct access to a database at the system level?

A) Risk of unauthorized access increases, but risk of untraceable changes to the database decreases.
B) Risk of unauthorized and untraceable changes to the database increases.
C) Risk of unauthorized access decreases, but risk of untraceable changes to the database increases.
D) Risk of unauthorized and untraceable changes to the database decreases.



4. What is the most common purpose of a virtual private network implementation?

A) A virtual private network (VPN) helps to secure access between an enterprise and its partners when communicating over an otherwise unsecured channel such as the Internet.
B) A virtual private network (VPN) helps to secure access between an enterprise and its partners when communicating over a dedicated T1 connection.
C) A virtual private network (VPN) helps to secure access within an enterprise when communicating over a dedicated T1 connection between network segments within the same facility.
D) A virtual private network (VPN) helps to secure access between an enterprise and its partners when communicating over a wireless connection.



5. What benefit does using capacity-monitoring software to monitor usage patterns and trends provide to management?

A) The software can dynamically readjust network traffic capabilities based upon current usage.
B) The software produces nice reports that really impress management.
C) It allows users to properly allocate resources and ensure continuous efficiency of operations.
D) It allows management to properly allocate resources and ensure continuous efficiency of operations.



1. Right Answer: C
Explanation: When trying to determine the existence of unauthorized access to data by a user or program, the IS auditor will often review the system logs.

2. Right Answer: C
Explanation: A graphical interface to the map of the network topology is essential for the IS auditor to obtain a clear understanding of network management.

3. Right Answer: B
Explanation: If users have direct access to a database at the system level, risk of unauthorized and untraceable changes to the database increases.

4. Right Answer: A
Explanation: A virtual private network (VPN) helps to secure access between an enterprise and its partners when communicating over an otherwise unsecured channel such as the Internet.

5. Right Answer: D
Explanation: Using capacity-monitoring software to monitor usage patterns and trends enables management to properly allocate resources and ensure continuous efficiency of operations.

0 Comments

Leave a comment