Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 98

Mary Smith

Sat, 06 Dec 2025

CISA—Certified Information Systems Auditor - Part 98

1. Which of the following is the MOST important reason for logging firewall activity?

A) Intrusion detection
B) Auditing purposes
C) Firewall tuning
D) Incident investigation



2. The PRIMARY purpose of a security information and event management (SIEM) system is to:

A) identify potential incidents
B) provide status of incidents
C) resolve incidents
D) track ongoing incidents



3. Which of the following is MOST likely to reduce the effectiveness of a signature-based intrusion detection system (IDS)?

A) The activities being monitored deviate from what is considered normal.
B) The environment is complex.
C) The pattern of normal behavior changes quickly and dramatically.
D) The information regarding monitored activities becomes state.



4. Information security awareness programs are MOST effective when they are:

A) customized for each target audience
B) conducted at employee orientation
C) reinforced by computer-based training
D) sponsored by senior management



5. An information security manager has discovered a potential security breach in a server that supports a critical business process. Which of the following should be the information security manager's FIRST course of action?

A) Validate that there has been an incident
B) Notify the business process owner
C) Shut down the server in an organized manner
D) Inform senior management of the incident



1. Right Answer: B
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: A
Explanation:

0 Comments

Leave a comment