Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 350

Mary Smith

Sat, 12 Jul 2025

CISA—Certified Information Systems Auditor - Part 350

1. Common implementations of strong authentication may use which of the following factors in their authentication efforts (Choose three.):(Select 3answers)

A) 'something you know'
B) 'something you have'
C) 'something you are'
D) 'something you have done in the past on this same system'
E) 'something you have installed on this same system'
F) None of the choices.

2. Effective transactional controls are often capable of offering which of the following benefits (Choose four.):(Select 4answers)

A) reduced administrative and material costs
B) shortened contract cycle times
C) enhanced procurement decisions
D) diminished legal risk
E) None of the choices.


3. In the context of physical access control, what is known as the process of verifying user identities?

A) Authentication
B) Authorization
C) Accounting
D) Encryption
E) Compression
F) None of the choices.

4. Physical access controls are usually implemented based on which of the following means (Choose two.):(Select 2answers)

A) mechanical locks
B) guards
C) operating systems
D) transaction applications
E) None of the choices.


5. Fault-tolerance is a feature particularly sought-after in which of the following kinds of computer systems:

A) desktop systems
B) laptop systems
C) handheld PDAs
D) business-critical systems
E) None of the choices.


1. Right Answer: A,B,C
Explanation: Two-factor authentication (T-FA) refers to any authentication protocol that requires two independent ways to establish identity and privileges. Common implementations of two-factor authentication use 'something you know' as one of the two factors, and use either 'something you have' or 'something you are' as the other factor. In fact, using more than one factor is also called strong authentication. On the other hand, using just one factor is considered by some weak authentication.

2. Right Answer: A,B,C,D
Explanation: Transactional systems provide a baseline necessary to measure and monitor contract performance and provide a method for appraising efficiency against possible areas of exposure. Effective transactional controls reduce administrative and material costs, shorten contract cycle times, enhance procurement decisions, and diminish legal risk.

3. Right Answer: A
Explanation: Authentication is the process of verifying a user's claimed identity. It is based on at least one of these three factors: Something you know, Something you have, orSomething you are.

4. Right Answer: A,B
Explanation: In physical security, access control refers to the practice of restricting entrance to authorized persons. Human means of enforcement include guard, bouncer, receptionist ... etc. Mechanical means may include locks and keys.

5. Right Answer: D
Explanation: Fault-tolerance enables a system to continue operating properly in the event of the failure of some parts of it. It avoids total breakdown, and is particularly sought- after in high-availability environment full of business critical systems.

0 Comments

Leave a comment