CISA Certified Information Systems Auditor – Question3018

In the 2c area of the diagram, there are three hubs connected to each other. What potential risk might this indicate?


A.
Virus attack
B. Performance degradation
C. Poor management controls
D. Vulnerability to external hackers

Correct Answer: B

Explanation:

Explanation:
Hubs are internal devices that usually have no direct external connectivity, and thus are not prone to hackers. There are no known viruses that are specific to hub attacks. While this situation may be an indicator of poor management controls, choice B is more likely when the practice of stacking hubs and creating more terminal connections is used.

CISA Certified Information Systems Auditor – Question3017

For locations 3a, 1d and 3d, the diagram indicates hubs with lines that appear to be open and active. Assuming that is true, what control, if any, should be recommended to mitigate this weakness?


A.
Intelligent hub
B. Physical security over the hubs
C. Physical security and an intelligent hub
D. No controls are necessary since this is not a weakness

Correct Answer: C

Explanation:

Explanation:
Open hubs represent a significant control weakness because of the potential to access a network connection easily. An intelligent hub would allow the deactivation of a single port while leaving the remaining ports active. Additionally, physical security would also provide reasonable protection over hubs with active ports.

CISA Certified Information Systems Auditor – Question3016

Assuming this diagram represents an internal facility and the organization is implementing a firewall protection program, where should firewalls be installed?


A.
No firewalls are needed
B. Op-3 location only
C. MIS (Global) and NAT2
D. SMTP Gateway and op-3

Correct Answer: D

Explanation:

Explanation:
The objective of a firewall is to protect a trusted network from an untrusted network; therefore, locations needing firewall implementations would be at the existence of the external connections. All other answers are incomplete or represent internal connections.

CISA Certified Information Systems Auditor – Question3015

Neural networks are effective in detecting fraud because they can:

A.
discover new trends since they are inherently linear.
B. solve problems where large and general sets of training data are not obtainable.
C. attack problems that require consideration of a large number of input variables.
D. make assumptions about the shape of any curve relating variables to the output.

Correct Answer: C

Explanation:

Explanation:
Neural networks can be used to attack problems that require consideration of numerous input variables. They are capable of capturing relationships and patterns often missed by other statistical methods, but they will not discover new trends. Neural networks are inherently nonlinear and make no assumption about the shape of any curve relating variables to the output. Neural networks will not work well at solving problems for which sufficiently large and general sets of training data are not obtainable.

CISA Certified Information Systems Auditor – Question3014

Which of the following types of firewalls would BEST protect a network from an internet attack?

A.
Screened subnet firewall
B. Application filtering gateway
C. Packet filtering router
D. Circuit-level gateway

Correct Answer: A

Explanation:

Explanation:
A screened subnet firewall would provide the best protection. The screening router can be a commercial router or a node with routing capabilities and the ability to allow or avoid traffic between nets or nodes based on addresses, ports, protocols, interfaces, etc.
Application-level gateways are mediators between two entities that want to communicate, also known as proxy gateways. The application level (proxy) works at the application level, not just at a package level. The screening controls at the package level, addresses and ports, but does not see the contents of the package. A packet filtering router examines the header of every packet or data traveling between the internet and the corporate network.

CISA Certified Information Systems Auditor – Question3013

Which of the following line media would provide the BEST security for a telecommunication network?

A.
broadband network digital transmission
B. Baseband network
C. Dial-up
D. Dedicated lines

Correct Answer: D

Explanation:

Explanation:
Dedicated lines are set apart for a particular user or organization. Since there is no sharing of lines or intermediate entry points, the risk of interception or disruption of telecommunications messages is lower.

CISA Certified Information Systems Auditor – Question3012

An installed Ethernet cable run in an unshielded twisted pair (UTP) network is more than 100 meters long. Which of the following could be caused by the length of the cable?

A.
Electromagnetic interference (EMI)
B. Cross-talk
C. Dispersion
D. Attenuation

Correct Answer: D

Explanation:

Explanation:
Attenuation is the weakening of signals during transmission. When the signal becomes weak, it begins to read a 1 for a 0, and the user may experience communication problems. UTP faces attenuation around 100 meters. Electromagnetic interference (EMl) is caused by outside electromagnetic waves affecting the desired signals, which is not the case here. Cross-talk has nothing to do with the length of the UTP cable.

CISA Certified Information Systems Auditor – Question3011

Which of the following is a control over component communication failure/errors?

A.
Restricting operator access and maintaining audit trails
B. Monitoring and reviewing system engineering activity
C. Providing network redundancy
D. Establishing physical barriers to the data transmitted over the network

Correct Answer: C

Explanation:

Explanation:
Redundancy by building some form of duplication into the network components, such as a link, router or switch to prevent loss, delays or data duplication is a control over component communication failure or error. Other related controls are loop/echochecks to detect line errors, parity checks, error correction codes and sequence checks. Choices A, B and D are communication network controls.

CISA Certified Information Systems Auditor – Question3010

When reviewing system parameters, an IS auditor's PRIMARY concern should be that:

A.
they are set to meet security and performance requirements.
B. changes are recorded in an audit trail and periodically reviewed.
C. changes are authorized and supported by appropriate documents.
D. access to parameters in the system is restricted.

Correct Answer: A

Explanation:

Explanation:
The primary concern is to find the balance between security and performance. Recording changes in an audit trail and periodically reviewing them is a detective control; however, if parameters are not set according to business rules, monitoring of changes may not be an effective control. Reviewing changes to ensure they are supported by appropriate documents is also a detective control, if parameters are set incorrectly, the related documentation and the fact that these are authorized does not reduce the impact.
Restriction of access to parameters ensures that only authorized staff can access the parameters; however, if the parameters are set incorrectly, restricting access will still have an adverse impact.

CISA Certified Information Systems Auditor – Question3009

In a client-server system, which of the following control techniques is used to inspect activity from known or unknown users?

A.
Diskless workstations
B. Data encryption techniques
C. Network monitoring devices
D. Authentication systems

Correct Answer: C

Explanation:

Explanation:
Network monitoring devices may be used to inspect activities from known or unknown users and can identify client addresses, which may assist in finding evidence of unauthorized access. This serves as a detective control. Diskless workstations prevent access control software from being bypassed. Data encryption techniques can help protect sensitive or propriety data from unauthorized access, thereby serving as a preventive control. Authentication systems may provide environment wide, logical facilities that can differentiate among users, before providing access to systems.