Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 163

Mary Smith

Tue, 13 Jan 2026

CISA—Certified Information Systems Auditor - Part 163

1. Proper segregation of duties prevents a computer operator (user) from performing security administration duties. True or false?

A) True
B) False
C)
D)



2. How do modems (modulation/demodulation) function to facilitate analog transmissions to enter a digital network?

A) Modems convert analog transmissions to digital, and digital transmission to analog.
B) Modems encapsulate analog transmissions within digital, and digital transmissions within analog.
C) Modems convert digital transmissions to analog, and analog transmissions to digital.
D) Modems encapsulate digital transmissions within analog, and analog transmissions within digital.



3. Which of the following are effective in detecting fraud because they have the capability to consider a large number of variables when trying to resolve a problem?

A) Expert systems
B) Neural networks
C) Integrated synchronized systems
D) Multitasking applications



4. What supports data transmission through split cable facilities or duplicate cable facilities?

A) Diverse routing
B) Dual routing
C) Alternate routing
D) Redundant routing



5. What type(s) of firewalls provide(s) the greatest degree of protection and control because both firewall technologies inspect all seven OSI layers of network traffic?

A) A first-generation packet-filtering firewall
B) A circuit-level gateway
C) An application-layer gateway, or proxy firewall, and stateful-inspection firewalls
D) An application-layer gateway, or proxy firewall, but not stateful-inspection firewalls



1. Right Answer: A
Explanation: Proper segregation of duties prevents a computer operator (user) from performing security administration duties.

2. Right Answer: A
Explanation: Modems (modulation/demodulation) convert analog transmissions to digital, and digital transmissions to analog, and are required for analog transmissions to enter a digital network.

3. Right Answer: B
Explanation: Neural networks are effective in detecting fraud because they have the capability to consider a large number of variables when trying to resolve a problem.

4. Right Answer: A
Explanation: Diverse routing supports data transmission through split cable facilities, or duplicate cable facilities.

5. Right Answer: C
Explanation: An application-layer gateway, or proxy firewall, and stateful-inspection firewalls provide the greatest degree of protection and control because both firewall technologies inspect all seven OSI layers of network traffic.

0 Comments

Leave a comment