Certified Information Systems Auditor-CISA Quiz Questions and Answers
Answer :
Regular backups
Explanation :
Regular backups are the only method of ensuring recovery of data after a successful
ransomware attack. Even if the ransom is paid, it is possible that the data may not
be recoverable and the possibility of data contamination with other malware exists.
How a backup is stored and maintained can influence the effectiveness as a means
for recovering from ransomware. Backups that are easily accessible may be
compromised before they can be put to use. Designing a proper backup
methodology with ransomware in mind is important
A fallback (or rollback) is a plan of action to be performed of a system
implementation, upgrade or modification/change does not work as intended.
Fallback restores the system to the state prior to the change. This is the most
common and effective method of mitigating the risk of downtime for mission critical
systems. All changes should have a fallback plan that includes instructions on
restoring the system to the prior state
The Local Area Network (LAN) switches are not connected to uninterruptible power supply units
Explanation :
Voice-over Internet Protocol (VoIP) telephone systems use standard network cabling and typically each telephone gets power over the network cable (power over Ethernet) from the wiring closet where the network switch is installed. If the local area network switches do not have backup power, the phones will lose power if there is a utility interruption and potentially not be able to make emergency calls.
High number of emergency changes might indicate an attempt to bypass standard
change management process controls, such as approval of changes by business,
proper testing, and validation of installation into production environment.
Bypassing of those controls might result in increased number of production
incidents, security deficiencies and improper changes installed into production
environment
The purpose of sociability testing is to ensure that a new or modified system can
operate in its target environment without adversely impacting existing systems. This
should cover the platform that will perform primary application processing and
interface with other systems, as well as changes to the desktop in a client-server or
web development
knowledge by the management staff of the client organization
Explanation :
Black box penetration testing assumes no prior knowledge of the infrastructure to be tested. Testers simulate an attack from someone who is unfamiliar with the system. It is important to have management knowledge of the proceedings so that if the test is identified by the monitoring systems, the legality of the actions can be determined quickly.
Stratification is the process of dividing a population into sub-populations with
similar characteristics explicitly defined, so that each sampling unit can belong to
only one stratum. This method of sampling ensures that all sampling units in each
subgroup have a known, non-zero chance of selection. It would be most appropriate
in this case
Defining a security policy for information and related technology is the first step
toward building a security architecture. A security policy communicates a coherent
security standard to users, management and technical staff. Security policies will
often set the stage in terms of what tools and procedures are needed for an
organization
The most important critical success factor (CSF) is the adequate involvement and
support of the various quality assurance, privacy, legal, audit, regulatory affairs or
compliance teams in high regulatory risk situations. Some IT system changes may,
based on risk ratings, require sign-off from key stakeholders before proceeding
A baseline is a reference point in the software development life cycle marked by the
completion and formal approval of a set of predefined work products. Change
management is easier when there is a baseline from which to work by helping to
identify deviations from established minimum requirements in scope or other
factors