Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 347

Mary Smith

Mon, 17 Mar 2025

CISA—Certified Information Systems Auditor - Part 347

1. Which of the following are valid choices for the Apache/SSL combination (Choose three.):(Select 3answers)

A) the Apache-SSL project
B) third-party SSL patches
C) the mod_ssl module
D) the mod_css module
E) None of the choices.


2. What would be the major purpose of rootkit?

A) to hide evidence from system administrators.
B) to encrypt files for system administrators.
C) to corrupt files for system administrators.
D) to hijack system sessions.
E) None of the choices.


3. Most trojan horse programs are spread through:

A) e-mails.
B) MP3.
C) MS Office.
D) Word template.
E) None of the choices.


4. The Trojan.Linux.JBellz Trojan horse runs as a malformed file of what format?

A) e-mails.
B) MP3.
C) MS Office.
D) Word template.
E) None of the choices.


5. Which of the following types of spyware was originally designed for determining the sources of error or for measuring staff productivity?

A) Keywords logging
B) Keystroke logging
C) Directory logging
D) Password logging
E) None of the choices.


1. Right Answer: A,B,C
Explanation: On Linux you have Apache which is supposed to be a safer choice of web service. In fact you have several choices for the Apache/SSL combination, such as theApache-SSL project (www.apache-ssl.org) using third-party SSL patches, or have Apache compiled with the mod_ssl module.

2. Right Answer: A
Explanation: rootkit originally describes those recompiled Unix tools that would hide any trace of the intruder.You can say that the only purpose of rootkit is to hide evidence from system administrators so there is no way to detect malicious special privilege access attempts.

3. Right Answer: A
Explanation: Most trojan horse programs are spread through e-mails. Some earlier trojan horse programs were bundled in Root Kits'. For example, the Linux Root Kit version3 (lrk3) which was released in December 96 had tcp wrapper trojans included and enhanced in the kit. Portable devices that run Linux can also be affected by trojan horse. The Trojan.Linux.JBellz Trojan horse runs as a malformed .mp3 file.'

4. Right Answer: B
Explanation: Most trojan horse programs are spread through e-mails. Some earlier trojan horse programs were bundled in Root Kits'. For example, the Linux Root Kit version3 (lrk3) which was released in December 96 had tcp wrapper trojans included and enhanced in the kit. Portable devices that run Linux can also be affected by trojan horse. The Trojan.Linux.JBellz Trojan horse runs as a malformed .mp3 file.'

5. Right Answer: B
Explanation: Keystroke logging (in the form of spyware) was originally a function of diagnostic tool deployed by software developers for capturing user's keystrokes.This is done for determining the sources of error or for measuring staff productivity.

0 Comments

Leave a comment