Certified Information Systems Auditor-CISA Quiz Questions and Answers

Answer :
  • Regular backups

Explanation :

Regular backups are the only method of ensuring recovery of data after a successful ransomware attack. Even if the ransom is paid, it is possible that the data may not be recoverable and the possibility of data contamination with other malware exists. How a backup is stored and maintained can influence the effectiveness as a means for recovering from ransomware. Backups that are easily accessible may be compromised before they can be put to use. Designing a proper backup methodology with ransomware in mind is important
Answer :
  • Fallback

Explanation :

A fallback (or rollback) is a plan of action to be performed of a system implementation, upgrade or modification/change does not work as intended. Fallback restores the system to the state prior to the change. This is the most common and effective method of mitigating the risk of downtime for mission critical systems. All changes should have a fallback plan that includes instructions on restoring the system to the prior state
Answer :
  • The Local Area Network (LAN) switches are not connected to uninterruptible power supply units

Explanation :

Voice-over Internet Protocol (VoIP) telephone systems use standard network cabling and typically each telephone gets power over the network cable (power over Ethernet) from the wiring closet where the network switch is installed. If the local area network switches do not have backup power, the phones will lose power if there is a utility interruption and potentially not be able to make emergency calls.
Answer :
  • Fast-tracking of releases into production

Explanation :

High number of emergency changes might indicate an attempt to bypass standard change management process controls, such as approval of changes by business, proper testing, and validation of installation into production environment. Bypassing of those controls might result in increased number of production incidents, security deficiencies and improper changes installed into production environment
Answer :
  • Sociability testing

Explanation :

The purpose of sociability testing is to ensure that a new or modified system can operate in its target environment without adversely impacting existing systems. This should cover the platform that will perform primary application processing and interface with other systems, as well as changes to the desktop in a client-server or web development
Answer :
  • knowledge by the management staff of the client organization

Explanation :

Black box penetration testing assumes no prior knowledge of the infrastructure to be tested. Testers simulate an attack from someone who is unfamiliar with the system. It is important to have management knowledge of the proceedings so that if the test is identified by the monitoring systems, the legality of the actions can be determined quickly.
Answer :
  • Stratified random sampling

Explanation :

Stratification is the process of dividing a population into sub-populations with similar characteristics explicitly defined, so that each sampling unit can belong to only one stratum. This method of sampling ensures that all sampling units in each subgroup have a known, non-zero chance of selection. It would be most appropriate in this case
Answer :
  • Defining a security policy

Explanation :

Defining a security policy for information and related technology is the first step toward building a security architecture. A security policy communicates a coherent security standard to users, management and technical staff. Security policies will often set the stage in terms of what tools and procedures are needed for an organization
Answer :
  • Adequate involvement of stakeholders

Explanation :

The most important critical success factor (CSF) is the adequate involvement and support of the various quality assurance, privacy, legal, audit, regulatory affairs or compliance teams in high regulatory risk situations. Some IT system changes may, based on risk ratings, require sign-off from key stakeholders before proceeding
Answer :
  • Change management

Explanation :

A baseline is a reference point in the software development life cycle marked by the completion and formal approval of a set of predefined work products. Change management is easier when there is a baseline from which to work by helping to identify deviations from established minimum requirements in scope or other factors