Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 165

Mary Smith

Thu, 15 May 2025

CISA—Certified Information Systems Auditor - Part 165

1. What are trojan horse programs?

A) A common form of internal attack
B) Malicious programs that require the aid of a carrier program such as email
C) Malicious programs that can run independently and can propagate without the aid of a carrier program such as email
D) A common form of Internet attack



2. What is/are used to measure and ensure proper network capacity management and availability of services?

A) Network performance-monitoring tools
B) Network component redundancy
C) Syslog reporting
D) IT strategic planning



3. What can be used to gather evidence of network attacks?

A) Access control lists (ACL)
B) Intrusion-detection systems (IDS)
C) Syslog reporting
D) Antivirus programs



4. Which of the following is a passive attack method used by intruders to determine potential network vulnerabilities?

A) Traffic analysis
B) SYN flood
C) Denial of service (DoS)
D) Distributed denial of service (DoS)



5. Which of the following fire-suppression methods is considered to be the most environmentally friendly?

A) Halon gas
B) Deluge sprinklers
C) Dry-pipe sprinklers
D) Wet-pipe sprinklers



1. Right Answer: D
Explanation: Trojan horse programs are a common form of Internet attack.

2. Right Answer: A
Explanation: Network performance-monitoring tools are used to measure and ensure proper network capacity management and availability of services.

3. Right Answer: B
Explanation: Intrusion-detection systems (IDS) are used to gather evidence of network attacks.

4. Right Answer: A
Explanation: Traffic analysis is a passive attack method used by intruders to determine potential network vulnerabilities. All others are active attacks.

5. Right Answer: C
Explanation: Although many methods of fire suppression exist, dry-pipe sprinklers are considered to be the most environmentally friendly.

0 Comments

Leave a comment