Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 341

Mary Smith

Thu, 15 May 2025

CISA—Certified Information Systems Auditor - Part 341

1. What is wrong with a Black Box type of intrusion detection system?

A) you cannot patch it
B) you cannot test it
C) you cannot examine its internal workings from outside.
D) you cannot tune it
E) None of the choices.


2. Which of the following are often considered as the first defensive line in protecting a typical data and information environment?

A) certificates
B) security token
C) password
D) biometrics
E) None of the choices.


3. Which of the following are the characteristics of a good password?

A) It has mixed-case alphabetic characters, numbers, and symbols.
B) It has mixed-case alphabetic characters and numbers.
C) It has mixed-case alphabetic characters and symbols.
D) It has mixed-case alphabetic characters, numbers, and binary codes.
E) None of the choices.


4. What is the recommended minimum length of a good password?

A) 6 characters
B) 8 characters
C) 12 characters
D) 18 characters
E) 22 characters
F) None of the choices.

5. Which of the following is a good tool to use to help enforcing the deployment of good passwords?

A) password cracker
B) local DoS attacker
C) network hacker
D) remote windowing tool
E) None of the choices.


1. Right Answer: C
Explanation: An intrusion detection system should be able to run continually without human supervision. The system must be reliable enough to allow it to run in the background of the system being observed. However, it should not be a black box', because you want to ensure its internal workings are examinable from outside.'

2. Right Answer: C
Explanation: Passwords are the first defensive line in protecting your data and information. Your users need to be made aware of what a password provides them and what can be done with their password. They also need to be made aware of the things that make up a good password versus a bad password.

3. Right Answer: A
Explanation: Passwords are the first defensive line in protecting your data and information. Your users need to be made aware of what a password provides them and what can be done with their password. They also need to be made aware of the things that make up a good password versus a bad password. A good password has mixed- case alphabetic characters, numbers, and symbols. Do use a password that is at least eight or more characters.

4. Right Answer: B
Explanation: Passwords are the first defensive line in protecting your data and information. Your users need to be made aware of what a password provides them and what can be done with their password. They also need to be made aware of the things that make up a good password versus a bad password. A good password has mixed- case alphabetic characters, numbers, and symbols. Do use a password that is at least eight or more characters.

5. Right Answer: A
Explanation: Passwords are the first defensive line in protecting your data and information. Your users need to be made aware of what a password provides them and what can be done with their password. They also need to be made aware of the things that make up a good password versus a bad password. A good password has mixed-case alphabetic characters, numbers, and symbols. Do use a password that is at least eight or more characters. You may want to run a password cracker' program periodically, and require users to immediately change any easily cracked passwords. In any case ask them to change their passwords every 90 to 120 days.'

0 Comments

Leave a comment