Act now and download your Isaca CISA test today! Do not waste time for the worthless Isaca CISA tutorials. Download Up to the immediate present Isaca Isaca CISA exam with real questions and answers and begin to learn Isaca CISA with a classic professional.
Online Isaca CISA free dumps demo Below:
NEW QUESTION 1
Creating which of the following is how a hacker can insure his ability to return to the hacked system at will?
Answer: D
Explanation:
A backdoor refers to a generally undocumented means of getting into a system, mostly for programming and maintenance/troubleshooting needs. Most real world programs have backdoors. Creating backdoors is how a hacker can insure his ability to return to the hacked system at will.
NEW QUESTION 2
Which of the following data validation edits is effective in detecting transposition and transcription errors?
Answer: B
Explanation:
A check digit is a numeric value that is calculated mathematically and is appended to data to ensure that the original data have not been altered or an incorrect, but valid, value substituted. This control is effective in detecting transposition and transcription errors.
NEW QUESTION 3
Which of the following would be the BEST overall control for an Internet business looking for confidentiality, reliability and integrity of data?
Answer: C
Explanation:
PKl would be the best overall technology because cryptography provides for encryption, digital signatures and non repudiation controls for confidentiality and reliability. SSL can provide confidentiality. IDS is a detective control. A VPN would provide confidentiality and authentication (reliability).
NEW QUESTION 4
Which of the following is MOST likely to result from a business process reengineering (BPR) project?
Answer: A
Explanation:
A BPR project more often leads to an increased number of people using technology, and this would be a cause for concern. Incorrect answers:
B. As BPR is often technology oriented, and this technology is usually more complex and volatile than in the past, cost savings do not often materialize in this areA.
D. There is no reason for IP to conflict with a BPR project, unless the project is not run properly.
NEW QUESTION 5
CORRECT TEXT
Which of the following is an advantage of prototyping?
Answer: B
NEW QUESTION 6
Information for detecting unauthorized input from a terminal would be BEST provided by the:
Answer: B
Explanation:
The transaction journal would record all transaction activity, which then could be compared to the authorized source documents to identify any unauthorized input. A console log printout is not the best, because it would not record activity from a specific terminal. An automated suspense file listing would only list transaction activity where an edit error
occurred, while the user error report would only list input that resulted in an edit error.
NEW QUESTION 7
Your final audit report should be issued:
Answer: A
Explanation:
Reporting can take the forms of verbal presentation, an issue paper or a written audit report summarizing observations and management's responses. After agreement is reached on the observations, a final report can be issued.
NEW QUESTION 8
An IS auditor reviewing an organization's IT strategic plan should FIRST review:
Answer: B
Explanation:
The IT strategic plan exists to support the organization's business plan. To evaluate the IT strategic plan, an IS auditor would first need to familiarize themselves with the business plan.
NEW QUESTION 9
Which of the following can help detect transmission errors by appending specially calculated bits onto the end of each segment of data?
Answer: A
Explanation:
A redundancy check can help detect transmission errors by appending especially calculated bits onto the end of each segment of datA.
NEW QUESTION 10
Obtaining user approval of program changes is very effective for controlling application changes and maintenance. True or false?
Answer: A
Explanation:
Obtaining user approval of program changes is very effective for controlling application changes and maintenance.
NEW QUESTION 11
Effective IT governance will ensure that the IT plan is consistent with the organization's:
Answer: A
Explanation:
To govern IT effectively, IT and business should be moving in the same direction, requiring that the IT plans are aligned with an organization's business plans. The audit and investment plans are not part of the IT plan, while the security plan should be at a corporate level.
NEW QUESTION 12
When transmitting a payment instruction, which of the following will help verify that the instruction was not duplicated?
Answer: D
Explanation:
When transmitting data, a sequence number and/or time stamp built into the message to make it unique can be checked by the recipient to ensure that the message was not intercepted and replayed. This is known as replay protection, and could be used toverify that a payment instruction was not duplicated. Use of a cryptographic hashing algorithm against the entire message helps achieve data integrity. Enciphering the message digest using the sender's private key, which signs the sender's digital signature to the document, helps in authenticating the transaction. When the message is deciphered by the receiver using the sender's public key, it ensures that the message could only have come from the sender. This process of sender authentication achieves nonrepudiation.
NEW QUESTION 13
The BEST way to minimize the risk of communication failures in an e-commerce environment would be to use:
Answer: D
Explanation:
Leased asynchronous transfer mode lines are a way to avoid using public and shared infrastructures from the carrier or Internet service provider that have a greater number of communication failures. Choice A, compression software, is a valid way to reduce the problem, but is not as good as leased asynchronous transfer mode lines. Choice B is a control based on higher protocol layers and helps if communication lines are introducing noise, but not if a link is down. Choice C, a packet-filtering firewall, does not reroute messages.
NEW QUESTION 14
Which of the following is the MOST reliable sender authentication method?
Answer: C
Explanation:
Digital certificates are issued by a trusted third party. The message sender attaches the certificate and the recipient can verify authenticity with the certificate repository. Asymmetric cryptography, such as public key infrastructure (PKl), appearsto authenticate the sender but is vulnerable to a man-in-the-middle attack. Digital signatures are used for both authentication and confidentiality, but the identity of the sender would still be confirmed by the digital certificate. Message authentication code is used for message integrity verification.
NEW QUESTION 15
Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card?
Answer: B
Explanation:
Data mining is a technique used to detect trends or patterns of transactions or datA. If the historical pattern of charges against a credit card account is changed, then it is a flag that the transaction may have resulted from a fraudulent use of the card.
NEW QUESTION 16
What can ISPs use to implement inbound traffic filtering as a control to identify IP packets transmitted from unauthorized sources? Choose the BEST answer.
Answer: C
Explanation:
ISPs can use access control lists to implement inbound traffic filtering as a control to identify IP packets transmitted from unauthorized sources.
NEW QUESTION 17
Which of the following is an example of a passive attack initiated through the Internet?
Answer: A
Explanation:
Internet security threats/vulnerabilities are divided into passive and active attacks. Examples of passive attacks include network analysis, eavesdropping and traffic analysis. Active attacks include brute force attacks, masquerading, packet replay, message modification, unauthorized access through the Internet or web-based services, denial-of-service attacks, dial-in penetration attacks, e-mail bombing and spamming, and e-mail spoofing.
NEW QUESTION 18
The MOST important difference between hashing and encryption is that hashing:
Answer: A
Explanation:
Hashing works one way; by applying a hashing algorithm to a message, a message hash/digest is created. If the same hashing algorithm is applied to the message digest, it will not result in the original message. As such, hashing is irreversible, whileencryption is reversible. This is the basic difference between hashing and encryption. Hashing creates an output that is smaller than the original message, and encryption creates an output of the same length as the original message. Hashing is usedto verify the integrity of the message and does not address security. The same hashing algorithm is used at the sending and receiving ends to generate and verify the message hash/digest. Encryption will not necessarily use the same algorithm at the sending and receiving end to encrypt and decrypt.
NEW QUESTION 19
......
100% Valid and Newest Version CISA Questions & Answers shared by Certshared, Get Full Dumps HERE: https://www.certshared.com/exam/CISA/ (New 980 Q&As)