Search Header Logo

CHAPTER 5 - CISA

Authored by Yohana Gracia Naomi

Computers

Professional Development

Used 7+ times

CHAPTER 5 - CISA
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(C-5-1) A fire sprinkler system has water in its pipes, and sprinkler heads emit water only

if the ambient temperature reaches 220°F. What type of system is this?

Deluge

Post-action

Wet Pipe

Pre-Action

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(C-5-2) An organization is building a data center in an area frequented by power outages.

The organization cannot tolerate power outages. What power system controls

should be selected?

Uninterruptible power supply and electric generator

Uninterruptible power supply and batteries

Electric generator

Electric generator and line conditioning

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(C-5-3) An auditor has discovered several errors in user account management: many

terminated employees’ computer accounts are still active. What is the best course

of action?

Improve the employee termination process.

Shift responsibility for employee terminations to another group.

Audit the process more frequently.

Improve the employee termination process and audit the process more

frequently.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(C-5-4) An auditor has discovered that several administrators in an application share an

administrative account. What course of action should the auditor recommend?

Implement activity logging on the administrative account

Use several named administrative accounts that are not shared.

Implement a host-based intrusion detection system.

Require each administrator to sign nondisclosure and acceptable-use

agreements.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(C-5-5) An organization that has experienced a sudden increase in its long-distance

charges has asked an auditor to investigate. What activity is the auditor likely to

suspect is responsible for this?

A. Employees making more long-distance calls

B. Toll fraud

C. PBX malfunction

D. Malware in the PBX

Employees making more long-distance calls

Toll fraud

PBX malfunction

Malware in the PBX

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(C-5-6) An auditor is examining a key management process and has found that the

IT department is not following its split-custody procedure. What is the likely

result of this failure?

One or more individuals are in possession of the entire password for an

encryption key.

One or more individuals are in possession of encrypted files.

Backup tapes are not being stored at an off-site facility.

Two or more employees are sharing an administrative account.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(C-5-7) A developer is updating an application that saves passwords in plaintext. What is

the best method for securely storing passwords?

Encrypted with each user’s public key

Encrypted with a public key

Encrypted with a private key

Hashed

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?