CISA EXAM SIMULATION TEST VOLUME I by AKINWALE AKINDIYA
Author:AKINWALE AKINDIYA [AKINDIYA, AKINWALE]
Language: eng
Format: azw3
Published: 2015-12-20T16:00:00+00:00
30. Governance of enterprise IT should be PRIMARILY driven by:
A. Organizational strategy
B. Regulatory framework
C. Industry best practices
D.IS Audit recommendations
A. Business strategy must be the focal point of IT. Every investment or policy in IT must be aligned with the business objectives. Industry best practices are ideal but may need to be customised to the peculiar environment of the organization.
31.If the single loss expectancy of a server is $500,000 and the possibility of the server breaking down irreparably is estimated to be once in five years, it is MOST LIKELY that the annual costs of protecting the asset will be set at…..
A. $500,000
B. $200,000
C. $100,000
D. $20,000
C. Annual Loss Expectancy=Single Loss Expectancy *Annual Rate of Occurrence; $500,000*(1/5) =$100,000
32.Which of the following frameworks was developed by five American accounting bodies ?
A. SOX
B. COSO
C. PCIDSS
D. ITIL
B. Committee of Sponsoring Organizations of the Treadway Commission(COSO) was developed by accounting bodies in America as a response to corporate failures in the country. The COSO framework emphasizes strengthening internal controls as a means of tacking irregularities. SOX is an Act of American parliament. PCIDSS was developed by organizations in the payment card industry such as American Express and Discover Financial Services .ITIL was developed by the UK government .
33. Asymmetric keys are BEST used to encrypt…………….
A. Bulk messages
B. Digests
C. Passwords
D. Honeypots
B. Asymmetric keys consume a lot of power during encryption and are therefore unsuitable for encrypting bulk messages. The encryption process is reversible and hence, it is not ideal for encrypting passwords. Digests are hashed form of messages which are usually of small sizes. Honeypots are used to lure a hacker to a seemingly vulnerable network in order to learn the mode of operation of an attacker.
34. Which of the following attacks is BEST addressed using non-technical defence strategy?
A. Denial of service
B. Phishing
C .Piggybacking
D. Salami
B. Phishing is a social engineering attack that is best addressed through security training as the best of technical defences cannot be 100% effective. Salami technique is used to remove small fractions of money from balances in a way that might be difficult to detect without sound programming skills. Piggybacking can be addressed with a deadman door (trap door).
35. Which of the following should be performed FIRST when developing an information security program?
A. Appointment of asset owners
B. Conducting vulnerability assessment
C. Implementing firewalls and Intrusion Detection Systems
D. Inventory of information assets
D. For an information security program to be effective, the assets to be protected must be known. Every other option should follow inventory of the assets.
36. Which of the following will be of GREATEST concern to an IS auditor reviewing the password management system of an organization?
A. Password change is not automatically enforced
B. Password files are encrypted with a two-way encryption algorithm
C. Initial passwords are system generated
D. A single factor authentication is adopted by the organization
B. Passwords should be hashed and stored securely as digests. If the algorithm is reversible, there is a strong possibility that the passwords will be compromised if the password file is brute forced. Though two-factor authentication is safer, most systems use a single factor authentication.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Future Crimes by Marc Goodman(2998)
Mastering Python for Networking and Security by José Manuel Ortega(2937)
Blockchain Basics by Daniel Drescher(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2506)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2478)
The Art Of Deception by Kevin Mitnick(2295)
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(2280)
The Code Book by Simon Singh(2205)
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(2156)
DarkMarket by Misha Glenny(1844)
Wireless Hacking 101 by Karina Astudillo(1843)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1838)
Machine Learning Security Principles by John Paul Mueller(1838)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(1833)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1831)
Mobile Forensics Cookbook by Igor Mikhaylov(1811)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(1803)
Solidity Programming Essentials by Ritesh Modi(1763)
Bulletproof Android: Practical Advice for Building Secure Apps (Developer's Library) by Godfrey Nolan(1667)