CISA Premium Bundle

CISA Premium Bundle

Isaca CISA Certification Exam

4.5 
(54000 ratings)
980 QuestionsPractice Tests
980 PDFPrint version
November 15, 2024Last update

Isaca CISA Free Practice Questions

Act now and download your Isaca CISA test today! Do not waste time for the worthless Isaca CISA tutorials. Download Up to the immediate present Isaca Isaca CISA exam with real questions and answers and begin to learn Isaca CISA with a classic professional.

Online Isaca CISA free dumps demo Below:

NEW QUESTION 1

Creating which of the following is how a hacker can insure his ability to return to the hacked system at will?

  • A. rootsec
  • B. checksum
  • C. CRC
  • D. backdoors
  • E. None of the choice

Answer: D

Explanation:
A backdoor refers to a generally undocumented means of getting into a system, mostly for programming and maintenance/troubleshooting needs. Most real world programs have backdoors. Creating backdoors is how a hacker can insure his ability to return to the hacked system at will.

NEW QUESTION 2

Which of the following data validation edits is effective in detecting transposition and transcription errors?

  • A. Range check
  • B. Check digit
  • C. Validity check
  • D. Duplicate check

Answer: B

Explanation:

A check digit is a numeric value that is calculated mathematically and is appended to data to ensure that the original data have not been altered or an incorrect, but valid, value substituted. This control is effective in detecting transposition and transcription errors.

NEW QUESTION 3

Which of the following would be the BEST overall control for an Internet business looking for confidentiality, reliability and integrity of data?

  • A. Secure Sockets Layer (SSL)
  • B. Intrusion detection system (IDS)
  • C. Public key infrastructure (PKI)
  • D. Virtual private network (VPN)

Answer: C

Explanation:

PKl would be the best overall technology because cryptography provides for encryption, digital signatures and non repudiation controls for confidentiality and reliability. SSL can provide confidentiality. IDS is a detective control. A VPN would provide confidentiality and authentication (reliability).

NEW QUESTION 4

Which of the following is MOST likely to result from a business process reengineering (BPR) project?

  • A. An increased number of people using technology
  • B. Significant cost savings, through a reduction in the complexity of information technology
  • C. A weaker organizational structures and less accountability
  • D. Increased information protection (IP) risk will increase

Answer: A

Explanation:

A BPR project more often leads to an increased number of people using technology, and this would be a cause for concern. Incorrect answers:
B. As BPR is often technology oriented, and this technology is usually more complex and volatile than in the past, cost savings do not often materialize in this areA.
D. There is no reason for IP to conflict with a BPR project, unless the project is not run properly.

NEW QUESTION 5
CORRECT TEXT
Which of the following is an advantage of prototyping?

  • A. The finished system normally has strong internal control
  • B. Prototype systems can provide significant time and cost saving
  • C. Change control is often less complicated with prototype system
  • D. it ensures that functions or extras are not added to the intended syste

Answer: B

NEW QUESTION 6

Information for detecting unauthorized input from a terminal would be BEST provided by the:

  • A. console log printou
  • B. transaction journa
  • C. automated suspense file listin
  • D. user error repor

Answer: B

Explanation:

The transaction journal would record all transaction activity, which then could be compared to the authorized source documents to identify any unauthorized input. A console log printout is not the best, because it would not record activity from a specific terminal. An automated suspense file listing would only list transaction activity where an edit error
occurred, while the user error report would only list input that resulted in an edit error.

NEW QUESTION 7

Your final audit report should be issued:

  • A. after an agreement on the observations is reache
  • B. before an agreement on the observations is reache
  • C. if an agreement on the observations cannot reache
  • D. without mentioning the observation
  • E. None of the choice

Answer: A

Explanation:

Reporting can take the forms of verbal presentation, an issue paper or a written audit report summarizing observations and management's responses. After agreement is reached on the observations, a final report can be issued.

NEW QUESTION 8

An IS auditor reviewing an organization's IT strategic plan should FIRST review:

  • A. the existing IT environmen
  • B. the business pla
  • C. the present IT budge
  • D. current technology trend

Answer: B

Explanation:

The IT strategic plan exists to support the organization's business plan. To evaluate the IT strategic plan, an IS auditor would first need to familiarize themselves with the business plan.

NEW QUESTION 9

Which of the following can help detect transmission errors by appending specially calculated bits onto the end of each segment of data?

  • A. Redundancy check
  • B. Completeness check
  • C. Accuracy check
  • D. Parity check

Answer: A

Explanation:
A redundancy check can help detect transmission errors by appending especially calculated bits onto the end of each segment of datA.

NEW QUESTION 10

Obtaining user approval of program changes is very effective for controlling application changes and maintenance. True or false?

  • A. True
  • B. False

Answer: A

Explanation:
Obtaining user approval of program changes is very effective for controlling application changes and maintenance.

NEW QUESTION 11

Effective IT governance will ensure that the IT plan is consistent with the organization's:

  • A. business pla
  • B. audit pla
  • C. security pla
  • D. investment pla

Answer: A

Explanation:

To govern IT effectively, IT and business should be moving in the same direction, requiring that the IT plans are aligned with an organization's business plans. The audit and investment plans are not part of the IT plan, while the security plan should be at a corporate level.

NEW QUESTION 12

When transmitting a payment instruction, which of the following will help verify that the instruction was not duplicated?

  • A. Use of a cryptographic hashing algorithm
  • B. Enciphering the message digest
  • C. Deciphering the message digest
  • D. A sequence number and time stamp

Answer: D

Explanation:

When transmitting data, a sequence number and/or time stamp built into the message to make it unique can be checked by the recipient to ensure that the message was not intercepted and replayed. This is known as replay protection, and could be used toverify that a payment instruction was not duplicated. Use of a cryptographic hashing algorithm against the entire message helps achieve data integrity. Enciphering the message digest using the sender's private key, which signs the sender's digital signature to the document, helps in authenticating the transaction. When the message is deciphered by the receiver using the sender's public key, it ensures that the message could only have come from the sender. This process of sender authentication achieves nonrepudiation.

NEW QUESTION 13

The BEST way to minimize the risk of communication failures in an e-commerce environment would be to use:

  • A. compression software to minimize transmission duratio
  • B. functional or message acknowledgment
  • C. a packet-filtering firewall to reroute message
  • D. leased asynchronous transfer mode line

Answer: D

Explanation:

Leased asynchronous transfer mode lines are a way to avoid using public and shared infrastructures from the carrier or Internet service provider that have a greater number of communication failures. Choice A, compression software, is a valid way to reduce the problem, but is not as good as leased asynchronous transfer mode lines. Choice B is a control based on higher protocol layers and helps if communication lines are introducing noise, but not if a link is down. Choice C, a packet-filtering firewall, does not reroute messages.

NEW QUESTION 14

Which of the following is the MOST reliable sender authentication method?

  • A. Digital signatures
  • B. Asymmetric cryptography
  • C. Digital certificates
  • D. Message authentication code

Answer: C

Explanation:

Digital certificates are issued by a trusted third party. The message sender attaches the certificate and the recipient can verify authenticity with the certificate repository. Asymmetric cryptography, such as public key infrastructure (PKl), appearsto authenticate the sender but is vulnerable to a man-in-the-middle attack. Digital signatures are used for both authentication and confidentiality, but the identity of the sender would still be confirmed by the digital certificate. Message authentication code is used for message integrity verification.

NEW QUESTION 15

Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card?

  • A. Intrusion detection systems
  • B. Data mining techniques
  • C. Firewalls
  • D. Packet filtering routers

Answer: B

Explanation:

Data mining is a technique used to detect trends or patterns of transactions or datA. If the historical pattern of charges against a credit card account is changed, then it is a flag that the transaction may have resulted from a fraudulent use of the card.

NEW QUESTION 16

What can ISPs use to implement inbound traffic filtering as a control to identify IP packets transmitted from unauthorized sources? Choose the BEST answer.

  • A. OSI Layer 2 switches with packet filtering enabled
  • B. Virtual Private Networks
  • C. Access Control Lists (ACL)
  • D. Point-to-Point Tunneling Protocol

Answer: C

Explanation:
ISPs can use access control lists to implement inbound traffic filtering as a control to identify IP packets transmitted from unauthorized sources.

NEW QUESTION 17

Which of the following is an example of a passive attack initiated through the Internet?

  • A. Traffic analysis
  • B. Masquerading
  • C. Denial of service
  • D. E-mail spoofing

Answer: A

Explanation:

Internet security threats/vulnerabilities are divided into passive and active attacks. Examples of passive attacks include network analysis, eavesdropping and traffic analysis. Active attacks include brute force attacks, masquerading, packet replay, message modification, unauthorized access through the Internet or web-based services, denial-of-service attacks, dial-in penetration attacks, e-mail bombing and spamming, and e-mail spoofing.

NEW QUESTION 18

The MOST important difference between hashing and encryption is that hashing:

  • A. is irreversibl
  • B. output is the same length as the original messag
  • C. is concerned with integrity and securit
  • D. is the same at the sending and receiving en

Answer: A

Explanation:

Hashing works one way; by applying a hashing algorithm to a message, a message hash/digest is created. If the same hashing algorithm is applied to the message digest, it will not result in the original message. As such, hashing is irreversible, whileencryption is reversible. This is the basic difference between hashing and encryption. Hashing creates an output that is smaller than the original message, and encryption creates an output of the same length as the original message. Hashing is usedto verify the integrity of the message and does not address security. The same hashing algorithm is used at the sending and receiving ends to generate and verify the message hash/digest. Encryption will not necessarily use the same algorithm at the sending and receiving end to encrypt and decrypt.

NEW QUESTION 19
......

100% Valid and Newest Version CISA Questions & Answers shared by Certshared, Get Full Dumps HERE: https://www.certshared.com/exam/CISA/ (New 980 Q&As)


START CISA EXAM