Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 338

Mary Smith

Sun, 15 Mar 2026

CISA—Certified Information Systems Auditor - Part 338

1. In order to coordinate the activity of many infected computers, attackers have used coordinating systems known as:

A) wormnets
B) trojannets
C) spynets
D) botnets
E) rootnets
F) backdoor

2. In a botnet, mailbot logs into a particular type of system for making coordinated attack attempts. What type of system is this?

A) Chat system
B) SMS system
C) Email system
D) Log system
E) Kernel system
F) None of the choices.

3. Which of the following software tools is often used for stealing money from infected PC owner through taking control of the modem?

A) System patcher
B) Porn dialer
C) War dialer
D) T1 dialer
E) T3 dialer
F) None of the choices.

4. Which of the following is an oft-cited cause of vulnerability of networks?

A) software monoculture
B) software diversification
C) single line of defense
D) multiple DMZ
E) None of the choices.


5. Introducing inhomogeneity to your network for the sake of robustness would have which of the following drawbacks?

A) poorer performance.
B) poor scalability.
C) weak infrastructure.
D) high costs in terms of training and maintenance.
E) None of the choices.


1. Right Answer: D
Explanation: In order to coordinate the activity of many infected computers, attackers are used coordinating systems known as botnets. In a botnet, the malware or mailbot logs in to an Internet Relay Chat channel or other chat system. The attacker can then give instructions to all the infected systems simultaneously.

2. Right Answer: A
Explanation: In order to coordinate the activity of many infected computers, attackers have used coordinating systems known as botnets. In a botnet, the malware or mailbot logs in to an Internet Relay Chat channel or other chat system. The attacker can then give instructions to all the infected systems simultaneously.

3. Right Answer: B
Explanation: One way of stealing money from infected PC owner is to take control of the modem and dial an expensive toll call. Dialer such as porn dialer software dials up a premium-rate telephone number and leave the line open, charging the toll to the infected user.

4. Right Answer: A
Explanation: An oft-cited cause of vulnerability of networks is homogeneity or software monoculture. In particular, Microsoft Windows has such a large share of the market that concentrating on it will enable a cracker to subvert a large number of systems. Introducing inhomogeneity purely for the sake of robustness would however bring high costs in terms of training and maintenance.

5. Right Answer: D
Explanation: An oft-cited cause of vulnerability of networks is homogeneity or software monoculture. In particular, Microsoft Windows has such a large share of the market that concentrating on it will enable a cracker to subvert a large number of systems. Introducing inhomogeneity purely for the sake of robustness would however bring high costs in terms of training and maintenance.

0 Comments

Leave a comment