Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 349

Mary Smith

Thu, 15 May 2025

CISA—Certified Information Systems Auditor - Part 349

1. The Federal Information Processing Standards (FIPS) were developed by:

A) the United States Federal government
B) ANSI
C) ISO
D) IEEE
E) IANA
F) None of the choices.

2. The Federal Information Processing Standards (FIPS) are primarily for use by (Choose two.):(Select 2answers)

A) all non-military government agencies
B) US government contractors
C) all military government agencies
D) all private and public colleges in the US
E) None of the choices.


3. Sophisticated database systems provide many layers and types of security, including (Choose three.):(Select 4answers)

A) Access control
B) Auditing
C) Encryption
D) Integrity controls
E) Compression controls


4. Which of the following refers to an important procedure when evaluating database security?

A) performing vulnerability assessments against the database.
B) performing data check against the database.
C) performing dictionary check against the database.
D) performing capacity check against the database system.
E) None of the choices.


5. Which of the following refers to any authentication protocol that requires two independent ways to establish identity and privileges?

A) Strong-factor authentication
B) Two-factor authentication
C) Dual-password authentication
D) Two-passphrases authentication
E) Dual-keys authentication
F) Rich-factor authentication

1. Right Answer: A
Explanation: Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States Federal government for use by all nonmilitary government agencies and by government contractors. Many FIPS standards are modified versions of standards used in the wider community.

2. Right Answer: A,B
Explanation: Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States Federal government for use by all nonmilitary government agencies and by government contractors. Many FIPS standards are modified versions of standards used in the wider community.

3. Right Answer: A,B,C,D
Explanation: Sophisticated database systems provide many layers and types of security, including Access control, Auditing, Authentication, Encryption and Integrity controls.An important procedure when evaluating database security is performing vulnerability assessments against the database. Database administrators or Information security administrators run vulnerability scans on databases to discover misconfiguration of controls within the layers mentioned above along with known vulnerabilities within the database software.

4. Right Answer: A
Explanation: Databases provide many layers and types of security, including Access control, Auditing, Authentication, Encryption and Integrity controls. An important procedure when evaluating database security is performing vulnerability assessments against the database. Database administrators or Information security administrators run vulnerability scans on databases to discover misconfiguration of controls within the layers mentioned above along with known vulnerabilities within the database software.

5. Right Answer: B
Explanation: Two-factor authentication (T-FA) refers to any authentication protocol that requires two independent ways to establish identity and privileges. Common implementations of two-factor authentication use 'something you know' as one of the two factors, and use either 'something you have' or 'something you are' as the other factor. In fact, using more than one factor is also called strong authentication. On the other hand, using just one factor is considered by some weak authentication.

0 Comments

Leave a comment