Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 343

Mary Smith

Mon, 17 Mar 2025

CISA—Certified Information Systems Auditor - Part 343

1. Which of the following can be thought of as the simplest and almost cheapest type of firewall?

A) stateful firewall
B) hardware firewall
C) PIX firewall
D) packet filter
E) None of the choices.


2. Screening router inspects traffic through examining:

A) message header.
B) virus payload
C) message content
D) attachment type
E) None of the choices.


3. A major portion of what is required to address nonrepudiation is accomplished through the use of:

A) strong methods for authentication and ensuring data validity
B) strong methods for authentication and ensuring data integrity.
C) strong methods for authorization and ensuring data integrity.
D) strong methods for authentication and ensuring data reliability.
E) None of the choices.


4. Why is it not preferable for a firewall to treat each network frame or packet in isolation?

A) Such a firewall has no way of knowing if any given packet is part of an existing connection, is trying to establish a new connection, or is just a rogue packet.
B) Such a firewall is costly to setup.
C) Such a firewall is too complicated to maintain.
D) Such a firewall is CPU hungry.
E) Such a firewall offers poor compatibility.
F) None of the choices.

5. Phishing attack works primarily through:

A) email and hyperlinks
B) SMS
C) chat
D) email attachment
E) news
F) file download

1. Right Answer: D
Explanation: The simplest and almost cheapest type of firewall is a packet filter that stops messages with inappropriate network addresses. It usually consists of a screening router and a set of rules that accept or reject a message based on information in the message header.

2. Right Answer: A
Explanation: The simplest and almost cheapest type of firewall is a packet filter that stops messages with inappropriate network addresses. It usually consists of a screening router and a set of rules that accept or reject a message based on information in the message header.

3. Right Answer: B
Explanation: A major portion of what is required to address nonrepudiation is accomplished through the use of strong methods for authentication and ensuring data integrity.

4. Right Answer: A
Explanation: A stateless firewall treats each network frame or packet in isolation.Such a firewall has no way of knowing if any given packet is part of an existing connection, is trying to establish a new connection, or is just a rogue packet.

5. Right Answer: A
Explanation: Phishing applies to email appearing to come from a legitimate business, requesting verification'' of information and warning of some dire consequence if it is not done. The letter usually contains a link to a fradulent web page that looks legitimate and has a form requesting everything from a home address to an ATM card'sPIN.'

0 Comments

Leave a comment