Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 344

Mary Smith

Thu, 15 May 2025

CISA—Certified Information Systems Auditor - Part 344

1. Which of the following types of attack often take advantage of curiosity or greed to deliver malware?

A) Gimmes
B) Tripwire
C) Icing
D) Soft coding
E) Pretexting
F) None of the choices.

2. Gimmes often work through:

A) SMS
B) IRC chat
C) email attachment
D) news
E) file download
F) None of the choices.

3. Talking about biometric authentication, physical characteristics typically include (Choose five.):(Select 5answers)

A) fingerprints
B) eye retinas
C) irises
D) facial patterns
E) hand measurements
F) None of the choices.

4. Talking about biometric authentication, which of the following is often considered as a mix of both physical and behavioral characteristics?

A) Voice
B) Finger measurement
C) Body measurement
D) Signature
E) None of the choices.


5. Performance of a biometric measure is usually referred to in terms of (Choose three.):(Select 3answers)

A) failure to reject rate
B) false accept rate
C) false reject rate
D) failure to enroll rate
E) None of the choices.


1. Right Answer: A
Explanation: Gimmes take advantage of curiosity or greed to deliver malware. Also known as a Trojan Horse, gimmes can arrive as an email attachment promising anything.The recipient is expected to give in to the need to the program and open the attachment. In addition, many users will blindly click on any attachments they receive that seem even mildly legitimate.

2. Right Answer: C
Explanation: Gimmes take advantage of curiosity or greed to deliver malware. Also known as a Trojan Horse, gimmes can arrive as an email attachment promising anything.The recipient is expected to give in to the need to the program and open the attachment. In addition, many users will blindly click on any attachments they receive that seem even mildly legitimate.

3. Right Answer: A,B,C,D,E
Explanation: Biometric authentication refers to technologies that measure and analyze human physical and behavioral characteristics for authentication purposes. Physical characteristics include fingerprints, eye retinas and irises, facial patterns and hand measurements, while behavioral characteristics include signature, gait and typing patterns. Voice is often considered as a mix of both physical and behavioral characteristics.

4. Right Answer: A
Explanation: Biometric authentication refers to technologies that measure and analyze human physical and behavioral characteristics for authentication purposes. Physical characteristics include fingerprints, eye retinas and irises, facial patterns and hand measurements, while behavioral characteristics include signature, gait and typing patterns. Voice is often considered as a mix of both physical and behavioral characteristics.

5. Right Answer: B,C,D
Explanation: Performance of a biometric measure is usually referred to in terms of the false accept rate (FAR), the false non match or reject rate (FRR), and the failure to enroll rate (FTE or FER). The FAR measures the percent of invalid users who are incorrectly accepted in, while the FRR measures the percent of valid users who are wrongly rejected.

0 Comments

Leave a comment